Sophos Firewall Recognized as a Strong Performer in The Forrester Wave™: Enterprise Firewalls, Q4 2022

Credit to Author: Sally Adam| Date: Wed, 19 Oct 2022 17:19:40 +0000

Sophos received the highest possible rating in the Product Vision, Execution Roadmap, Supporting Products and Services, Efficacy, Threat Intelligence, Zero Trust environments, and IP Sec and VPN criteria

Read more

How IT and security teams can work together to improve endpoint security

Credit to Author: Christine Barrett| Date: Thu, 04 Aug 2022 16:00:00 +0000

The threat landscape has changed over the last few years. A mitigation strategy involves collaboration between the security operations and IT infrastructure teams. There are three best practices to enable collaboration, highlighting the role of endpoint management in helping organizations unify their efforts in this blog.

The post How IT and security teams can work together to improve endpoint security appeared first on Microsoft Security Blog.

Read more

What is zero trust and why is ZTNA so important?

Credit to Author: Chris McCormack| Date: Wed, 20 Jul 2022 18:17:35 +0000

Trust is a dangerous word in IT, especially when that trust is granted without much consideration: when it’s implied, or when it’s never questioned. Creating a sealed-off perimeter where everything and everyone within the network is fully trusted has proven to be a flawed design. Yet, that’s how many networks are still implemented today. Anyone […]

Read more

How to improve risk management using Zero Trust architecture

Credit to Author: Christine Barrett| Date: Mon, 23 May 2022 17:00:00 +0000

Risk management plays a critical role in helping organizations with their security posture enhancement. Taking insider incidents as an example, they are not only costly to organizations but also time-consuming to be contained. As such, the ROI is maximized in effectively protecting the organizations’ assets as well as ensuring their business operations. Risk management is an ongoing activity. Are the long-established risk management programs in the enterprises staying on top of the evolving digital and threat landscapes?

The post How to improve risk management using Zero Trust architecture appeared first on Microsoft Security Blog.

Read more

Easy authentication and authorization in Azure Active Directory with No-Code Datawiza

Credit to Author: Christine Barrett| Date: Tue, 17 May 2022 17:00:00 +0000

The acceleration of cloud journeys fueled by the pandemic, and ever-increasing concerns about data security and information privacy, have made access management one of the hottest topics.

The post Easy authentication and authorization in Azure Active Directory with No-Code Datawiza appeared first on Microsoft Security Blog.

Read more

Microsoft best practices for managing IoT security concerns

Credit to Author: Christine Barrett| Date: Mon, 25 Apr 2022 16:00:00 +0000

The Internet of Things, or IoT, has expanded beyond the mere concept that it was when first introduced. IoT is now part of most individuals’ daily activities, from smart speakers and thermostats to smartwatches and vehicles. IoT devices and systems bring massive convenience and functionality. However, due to the complicated nature of IoT, when implementing and managing IoT, security must be top of mind.

The post Microsoft best practices for managing IoT security concerns appeared first on Microsoft Security Blog.

Read more

Discover the anatomy of an external cyberattack surface with new RiskIQ report

Credit to Author: Christine Barrett| Date: Thu, 21 Apr 2022 16:00:00 +0000

Learn how supply chains, shadow IT, and other factors are growing the external attack surface—and where you need to defend your enterprise.

The post Discover the anatomy of an external cyberattack surface with new RiskIQ report appeared first on Microsoft Security Blog.

Read more