Firewalls – Love Them or List Them
Zero trust is the current rallying cry for security architecture. Does that signal the death knell for firewalls?
Zero trust is the current rallying cry for security architecture. Does that signal the death knell for firewalls?
There are frequent calls for yet another ICT policy, often overlapping existing ones. A holistic view – an ICT policy framework – can reduce the effort to create and maintain policies, and deliver benefits through increased compliance.
From data breaches to identity theft, enterprise users have lost confidence in the capabilities of password managers to ensure their security given the multiple incidences of hacking. IBRS explores the relevance of these tools where the growth of threats and vulnerabilities undermine organisations’ safety.
Is the zero trust approach losing its appeal in cyber security? Understand the missteps organisations are making with the zero trust approach.
Deciding on whether to employ a customer identity solution or to build it in-house can be a challenge for many enterprises. Organisations therefore need to consider the pros and cons of each option to achieve the goal of building security into each customer experience.
Are human penetration testers still necessary if the task can be automated?
Building defences against customer data breaches requires enterprises to efficiently govern, assess, and control access to safeguard information. IBRS explores some strategies to reduce the impact of threats by adding layers of security to ensure business compliance to regulatory standards and increase customer confidence.
The cyber insurance market is evolving rapidly. Is your policy up to date?
Setting Cloud maturity readiness supports an enterprise in aligning its strategies to its enterprise overall goals. How can such organisations make a successful transition to Cloud adoption and gain the benefits of Cloud technology?