Remove Authentication Remove Examples Remove Firewall
article thumbnail

Are Your Firewalls and VPNs the Weakest Link in Your Security Stack?

Network World

It’s the opposite of a firewall and VPN architecture, where once on the corporate network everyone and everything is trusted. Recent critical vulnerabilities in VPNs and firewalls have exposed the risks associated with perimeter-based security measures. In today’s digital age, cybersecurity is no longer an option but a necessity.

Firewall 158
article thumbnail

Overcoming the Equation: Security = Friction

CTOvision

We’re not done yet, though – badges for physical access, PKI, USB keys, SmartCards, soft certs, biometrics, Network Access Control, firewalls, IPS/IDS, SIEM … I could go on and on. A telling example is the Department of Defense and its approach to mobile security. Userids and passwords are almost free.

Security 249
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fountainhead: The End of the Laptop-Centric World?

Fountainhead

Let me give you a hypothetical example - but based very much in reality ( names have been changed to protect the innocent ). She shares these folders with her co-workers as well as client contacts within each company (and who are behind each clients firewall) as interactive project-based workspaces. Act I: The Setup.

article thumbnail

CIOs Want To Know: How Secure Is Your Mobile Phone?

The Accidental Successful CIO

I have an excellent example for you to ponder. Should mobile phone users be concerned about relying on their mobile phones for text messaging based two-factor authentication? What this means on a daily basis is that you are probably installing firewalls and creating white lists for who can access what applications and servers.

Mobile 246
article thumbnail

Using Multi-factor Authentication (MFA) | Roadmap to Securing Your Infrastructure

Linux Academy

I’m sure most everyone is familiar with the concept of passphrases, which is the use of a phrase instead of a single password — for example, “The moon is made of ch33se!” It also provides a handy browser plugin to fill in credentials for me, once I’ve authenticated to the plugin. Multi-factor authentication (MFA).

article thumbnail

Starting zero trust without spending a dime

Network World

NIST, other government agencies, and industry bodies point towards the policy enforcement point (PEP) as the gateway device or service that performs this separation, gating access based on different authentication and authorization requirements, depending on the sensitivity of the resource.

Policies 147
article thumbnail

The Power of Depth of Defense for Cybersecurity

SecureWorld News

Real-life examples of depth of defense Network Perimeter: Organizations often deploy firewalls, intrusion detection systems, and network monitoring tools at the network perimeter to prevent unauthorized access. Real-life examples and statistics are poignant reminders about the effectiveness that depth brings to cybersecurity.