Zero Trust Architecture (ZTA) is a trendy term touted by cybersecurity vendors. But there isn’t a single ZTA solution. The architecture is composed of numerous components, that when taken together, form a new paradigm for dealing with cybersecurity that is appropriate in a modern world where corporate enterprises are no longer confined to a well-defined and trustworthy perimeter such as remote working and cloud environments. For reference, the National Institute of Standards and Technology (NIST) has created a very detailed ZTA publication
The New England College of Optometry (NECO) formed a COVID-19 Task Force and began exploring ideas to enable in-person learning at the school in a safe, effective and well-planned manner. One of the solutions that NECO implemented is a contact-tracing tool that allows the school to respond immediately to report of an infection, accurately and effectively, without relying on a sign-in sheet or a person’s recollection of their previous contacts.
The New England College of Optometry (NECO) formed a COVID-19 Task Force and began exploring ideas to enable in-person learning at the school in a safe, effective and well-planned manner. One of the solutions that NECO implemented is a contact-tracing tool that allows the school to respond immediately to report of an infection, accurately and effectively, without relying on a sign-in sheet or a person’s recollection of their previous contacts.
From the initial secured entrance to the overarching access control system, the emphasis is currently on contactless access control and door entry solutions. A myriad of technologies from NFC and smart mobile devices to facial biometrics will help play a vital role in what are now COVID-driven essentials. An integrated strategy for access control, along with tailgating mitigation options including turnstiles, revolving doors and mantrap portals enables building security to implement even more comprehensive control and prioritized security while making use of touchless credentials.
Keeping unauthorized intruders from entering a business location is a critical part of protecting corporate assets. Perimeters are the first line of defense but do not conform to a ‘one-size-fits-all’ safeguarding solution. Selection criteria for the most suitable Perimeter Intrusion Detection System (PIDS) must take into consideration perimeter length, topography, environmental conditions, and future site expansion plans.
The reality is that most institutions of higher learning have decided to open their campuses this fall regardless of the political rancor, adding the specter of a deadly pandemic to an already challenging campus security environment where campus shootings, physical violence to women and theft usually occupy the top threat metrics for college security administrators. Because college and university campuses have thousands of students and faculty traversing a wide swath of buildings all day, every day, having an access control solution that not only addresses the security aspect of this population, but now one that must also handle myriad safety and health concerns due to COVID-19 to lessen the likelihood of the virus spreading, is a top priority.
Many lessons were learned in enterprise IT and security teams in 2020, right down to the final weeks of the year with the SolarWinds attack. We closed out a miserable year with a devastating reminder about the danger of third party access and supply chain attacks.
In the United States, February is often considered the last peak month of flu season. We are all accustomed to the unpleasant coughing fits and runny noses that accompany winter’s chill. However, in a turn of events, the common flu has been relatively uncommon across the country this winter. Instead, we continue to deal with the fallout from the far more contagious—and far less forgiving—SARS-CoV-2 virus.
Meet Jeremy Leasher, Security Solutions Architect at Axellio. Leasher believes the IT security industry is undergoing a serious skills crisis, threatening to undermine the security of commercial and government organizations. Here, we talk to Leasher about the best approach to solving this skills crisis.
Cybersecurity is not a one-and-done proposition. Deterring cybersecurity threats and remediating incidents is a complex and never-ending responsibility. Malicious state actors, cybercriminals and corporate espionage are just a few sources of cyberattacks. Each one uses dozens of ever-evolving techniques to overcome security safeguards.
A 2019 S&P Global study found that public companies with women at the helm were more profitable compared to those with men in the CEO and CFO seats. Women are also making big inroads in other fields including science and medicine. Yet in the tech and cybersecurity industries women still lag behind. It’s certainly not because of a lack of jobs. Though the talent shortage did ease last year, the industry as a whole is struggling to fill vacancies. There are a few reasons that women aren’t filling those seats.