article thumbnail

Center for Internet Security: 18 security controls you need

Network World

The Center for Internet Security has updated its set of safeguards for warding off the five most common types of attacks facing enterprise networks—web-application hacking, insider and privilege misuse, malware, ransomware, and targeted intrusions. To read this article in full, please click here

Internet 506
article thumbnail

6 key mobile and IoT/OT attack trend findings

Network World

Among the fastest-moving frontiers in enterprise cybersecurity: mobile, the internet of things (IoT), and operational technology (OT) systems. of people access the internet with a mobile device, while 59% of internet traffic is generated by mobile devices. Top mobile and IoT/OT targets 5.

Mobile 418
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zscaler Report: Mobile, IoT, and OT Cyber Threats Surge in 2024

Tech Republic Security

Zscaler ThreatLabz report reveals a 2024 surge in mobile, IoT, and OT cyberattacks, highlighting key trends and the need for zero trust security.

Mobile 466
article thumbnail

Mobile World Congress 2017: Observations Regarding The Main Enterprise Themes

Forrester IT

Recently, the largest annual get together of the mobile industry, Mobile World Congress (MWC) took place in Barcelona. In my opinion, the biggest themes at MWC in 2017 that are relevant for enterprise customers were the internet of things (IoT), artificial intelligence (AI), platforms, collaboration, and connectivity.

Mobile 346
article thumbnail

Are Your Firewalls and VPNs the Weakest Link in Your Security Stack?

Network World

A Zero Trust platform ensures applications and data are not visible to the public internet and users are only provided least privilege access, preventing lateral movement and protecting against ransomware attacks. With a Zero Trust architecture, the internet is the primary transport medium and effectively becomes the new corporate network.

Firewall 396
article thumbnail

How to secure your internet activity on iOS devices

Tech Republic Security

Learn about the on-device and network security options available to you in order to supercharge your internet security when browsing the web and using apps on iOS. The post How to secure your internet activity on iOS devices appeared first on TechRepublic.

Internet 370
article thumbnail

US moves to tighten restrictions on China Telecom amid security fears

Network World

The US Commerce Department is intensifying its actions against China Telecoms US unit over concerns that its cloud and internet services could be used to funnel American data to Beijing, according to a Reuters report. However, there are still gaps that need to be addressed, said Sanjaya Kumar, CEO of SureShield.

Security 379