SAN FRANCISCO – Google Next 2018 – Security and convenience are usually in opposition, but Google is looking to change that with a hardware key that provides cloud access to priority end users, such as cloud admins.
The cloud provider also debuted added security for virtualized and containerized applications, and added G Suite protections.
Now entering its fifth year, the 2020 Vision Executive Summit is an exclusive meeting of global CSP executives focused on navigating the disruptive forces at work in telecom today. Join us in Lisbon on December 4-6 to meet with fellow experts as we define the future of next-gen communications and how to make it profitable.
Among the most significant security advances introduced by Google: Context-Aware Access defines and enforces policies based on the user location, access device and other attributes. New container protections authenticate the identity and security of individual containers. And hardened virtual machines protect against rootkits and other attacks.
5G technology holds a good deal of promise for businesses, from expanded IoT capabilities to new ways to reach customers. The downside is that these networks require a new security approach, which InfoSec teams need to start thinking about now.
Over the last year, vulnerable, cloud-based databases have shown that dangers of trusting data to others. However, an exposed government server in Oklahoma proves that attackers can find on-premises data, too.
With the discovery of 'Collection #1,' security researcher Troy Hunt appears to have found the largest repository of stolen email addresses and passwords ever, totaling more than 87GB and 12,000 separate files.
In an era when enterprises are scrambling to keep up with security demands, a new industry survey from ISF finds that having more diverse skills on the InfoSec team is one way to ensure a more stable workforce.