Story image

The five key elements of closed-loop network security

Network security can be an intimidating discipline for most organisations.

The threat landscape is becoming increasingly dangerous, as malicious actors focus their energy on developing sophisticated, targeted attacks.

At the same time, the anywhere, anytime mobile workforce, digital workplace transformation, IoT applications, and the move to the cloud are increasing the size and complexity of IT infrastructures and their associated attack surfaces.

This all means that in the era of digital transformation businesses have become vulnerable to a host of threats.

Due to these broad threat spectrums traditional security policies simply no longer cut it.

These policies were mostly binary, denying or allowing access to the network for users with an unmanaged or managed device.

Security policies like these simply do not account for the complexity of today’s business networks, which include access for non-employees, as well as IoT devices like telephones, manufacturing robots, cameras, or drones.

To address the scale and scope of IT initiatives and digital transformation, CISOs must adopt a closed-loop approach to network security.

Find out how to implement the five key elements of closed-loop network security below.

Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."
D-Link hooks up with Alexa and Assistant with new smart camera
The new camera is designed for outdoor use within a wireless smart home network.
Slack users urged to update to prevent security vulnerability
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."