Cybersecurity Leadership
21.0K views | +17 today
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
Scoop.it!

Zero trust is a strategy, not a technology

Zero trust is a strategy, not a technology | Cybersecurity Leadership | Scoop.it
Zero-trust security should be seen as a strategy to protect high-value assets and is not tied to a specific technology or product, says the model’s creator John Kindervag
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Zero-trust Networks: Implementation is No Walk in the Park

Zero-trust Networks: Implementation is No Walk in the Park | Cybersecurity Leadership | Scoop.it

Zero-trust network implementations can require an entire redefinition of your network architecture, the introduction of new technologies, and the training of both users and IT. Here’s what you need to know when you make your move to zero-trust.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

As they brace for recession, companies must not overlook their data and identity risks

As they brace for recession, companies must not overlook their data and identity risks | Cybersecurity Leadership | Scoop.it

With more layoffs likely in 2023 – as well as many instances of company restructuring, market consolidation and increased employee churn — it is vitally important that organisations are alert to the potential data security risks that these periods of rapid change can bring.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

How legacy tech impedes zero trust and what to do about it

How legacy tech impedes zero trust and what to do about it | Cybersecurity Leadership | Scoop.it
Old perimeter-based defenses can throw up roadblocks to implementing a zero-trust strategy, but a measured, phased approach will see you through.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Companies Must Focus On The 'Trust' Part Of Zero Trust Security Models

Companies Must Focus On The 'Trust' Part Of Zero Trust Security Models | Cybersecurity Leadership | Scoop.it
Businesses that adopt zero trust cybersecurity measures must remember that technology is less important than meeting stakeholders' needs.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

A cybersecurity expert explains why it’s time to get serious about Zero Trust

A cybersecurity expert explains why it’s time to get serious about Zero Trust | Cybersecurity Leadership | Scoop.it

Zero Trust is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating every stage of a digital interaction.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Keeping Track of Identity in the Dynamic World of the Hybrid Cloud

Keeping Track of Identity in the Dynamic World of the Hybrid Cloud | Cybersecurity Leadership | Scoop.it

Why is identity management more difficult in the cloud?

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Behind the push to finally eliminate passwords

Behind the push to finally eliminate passwords | Cybersecurity Leadership | Scoop.it
The FIDO Alliance is pushing for smartphones to become the authentication standard as the tech industry presses for new methods. 
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Zero-Trust Security Framework: A CIO's View

Zero-Trust Security Framework: A CIO's View | Cybersecurity Leadership | Scoop.it
With the amount of damage an attack could cause to a company's reputation and bottom line, it makes sense to trust no one.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Privileged Access Management – Probably the most important security control you will implement

Privileged Access Management – Probably the most important security control you will implement | Cybersecurity Leadership | Scoop.it
By Stephen Gailey That's quite a bold statement to open with, particularly given how many different security technologies there are today. Holding one
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Security Leaders And The C-Suite: Solving The Zero-Trust Strategy Gap

Security Leaders And The C-Suite: Solving The Zero-Trust Strategy Gap | Cybersecurity Leadership | Scoop.it
Achieving a zero-trust framework is a multi-year maturity mindset, one that requires trust and cooperation to ensure that the framework is built on a solid foundation.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

5 areas where zero trust can’t protect your organization

5 areas where zero trust can’t protect your organization | Cybersecurity Leadership | Scoop.it

Adopting zero trust is no fail safe against cyberattacks. Attackers are constantly finding new ways to get around zero trust, and this often happens because not everything within the organization environment was considered when employing zero trust.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Zero Trust is Not About “Zero”: It’s About “Trust”

Zero Trust is Not About “Zero”: It’s About “Trust” | Cybersecurity Leadership | Scoop.it
Putting technology first is the biggest mistake you can make with Zero Trust; working with stakeholders is key to success
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Identity-based cyberattacks are the leading cause of security breaches. Here’s how to stop them.

Identity-based cyberattacks are the leading cause of security breaches. Here’s how to stop them. | Cybersecurity Leadership | Scoop.it

Ultimately, to defeat identity-based attacks, businesses will want to adopt a “defense in depth” strategy that involves multiple layers of defense and recognizes that identity now plays an outsize role in the attacker playbook

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Sorting zero-trust hype from reality

Sorting zero-trust hype from reality | Cybersecurity Leadership | Scoop.it
Zero trust is not a product, but a security methodology based on defense-in-depth and least-privileged access concepts.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Overcoming The InfoSec Identity Crisis

Overcoming The InfoSec Identity Crisis | Cybersecurity Leadership | Scoop.it
The identity tools and processes in place today are heavily fragmented and wrought with major gaps.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

How Will Zero Trust Change SaaS Security?

How Will Zero Trust Change SaaS Security? | Cybersecurity Leadership | Scoop.it

SaaS applications are, by definition, managed by a third-party and outside the organization’s control. How can organizations regulate access and ensure that applications and data are safe from attacks?

No comment yet.
Scooped by JC Gaillard
Scoop.it!

A Big Bet to Kill the Password for Good

A Big Bet to Kill the Password for Good | Cybersecurity Leadership | Scoop.it
After a decade of work, the FIDO Alliance says it’s found the missing piece in the bridge to a password-free future.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The internet of identities is coming and will bring massive IAM changes

The internet of identities is coming and will bring massive IAM changes | Cybersecurity Leadership | Scoop.it
New demands for scale, security and machine learning will support massive proliferation of internet-connected devices.
No comment yet.