Researcher John Kindervag, in his 2010 article, recommended that administrators of sensitive computer networks not trust anyone, regardless of the employee’s position.
“Once an attacker gets past the shell, he has access to all the resources in our network. We’ve built strong perimeters, but well-organized cybercriminals have recruited insiders and developed new attack methods that easily pierce our current security protections. To [...]
The COVID-19 pandemic has accelerated the transition to cloud computing and telecommuting. Today’s dynamic work environment promises new levels of productivity and innovation. But at the same time have appeared problems that are related to information security and reliability.
The number of cyberattacks has skyrocketed. Since the start of the pandemic, when many workers gained remote access to corporate resources, the number of allegations of [...]