Remove Application Remove Authentication Remove Cybersecurity Remove Security
article thumbnail

Security Industry Association Announces Winners of the 2024 SIA New Products & Solutions Awards

Security Industry Association

IronYun took the top honor in SIA’s annual award program recognizing innovative security products in partnership with ISC West. Since its inception in 1979, SIA NPS has been the security industry’s premier product awards program. The SIA NPS Program is the most recognized global platform for launching new products each year.

Security 119
article thumbnail

SIA New Member Profile: Enterprise Security, Inc.

Security Industry Association

New Security Industry Association (SIA) member Enterprise Security, Inc. ESI) is a systems integration company specializing in completely integrated, innovative security management systems. Emens, chief operating officer at Enterprise Security, Inc., about the company, the security industry and working with SIA.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Post: Cybersecurity Incidents Lead to New Standards, Requirements

Security Industry Association

Axis Communications’ Wayne Dorris Discusses How Mirai, SolarWinds Have Pushed the United States and European Union to Act Wayne Dorris is business development manager, cybersecurity, at Axis Communications. Virtually no security manufacturers are exempt from the perils of cybercrime. Many cybersecurity standards in the U.S.

article thumbnail

Enhancing Cybersecurity Resilience: Zerto’s Role in Supporting the Australian Essential Eight

Zerto

In the ever-evolving landscape of cybersecurity threats , organizations globally are seeking robust solutions to protect their data. These strategies, outlined by the ASD, form a comprehensive framework to mitigate cybersecurity incidents effectively.

article thumbnail

What is Zero Trust Architecture?

Pure Storage

Zero trust is not a product, service, or technology; rather it’s a strategy and standard, and one that more enterprises are adopting in place of outdated security approaches. In this article, we’ll discuss what ZTA is, why it’s augmenting traditional perimeter network security, and how to implement it. Implement least privilege.

article thumbnail

These social media mistakes can endanger your business’s cybersecurity posture

Online Computers

But if your employees fail to use social media responsibly, it can pose significant cybersecurity risks to your business. These errors include mistakes employees made on social media, such as posting sensitive information that may compromise security. Related reading : The most common ways human factors weaken business cybersecurity.

Media 52
article thumbnail

Resiliency Is Top Priority in 2023 White House Cybersecurity Strategy

Pure Storage

Resiliency Is Top Priority in 2023 White House Cybersecurity Strategy by Pure Storage Blog Last week, the White House released the updated National Cybersecurity Strategy for 2023—“A Path to Resilience.” As you review the key objectives and recommendations, ask yourself: Is my security architecture resilient?