What Is Secure Access Service Edge?

There has been plenty of hype around secure access service edge. Some even say it is replacing legacy network and security architectures. Drew Robb, writing for TechRepublic Premium, lays out what it is, how it fits within the security and networking landscape, whether it is replacing SD-WAN, its benefits, its challenges, and how to implement …

Read More
How to Meet the NCSC’s 14 Cloud Security Principles

How to Meet the NCSC’s 14 Cloud Security Principles

Guidance for conducting your due diligence when outsourcing to a Cloud service provider With flexible working now the norm – including remote working – many organisations rely on Cloud services to access confidential data. But whenever organisations adopt such technological solutions, they must acknowledge the risks that come with it. To name but one challenge: the Cloud inherently permits access from anywhere in the world. So, how do you restrict that access to authorised users only? To mitigate such security risks, the NCSC (National Cyber Security Centre) established 14 Cloud security principles. These can help guide your due diligence checks when vetting
The post How to Meet the NCSC’s 14 Cloud Security Principles appeared first on IT Governance UK Blog.

Read More

Fair Vote Canada – 134,336 breached accounts

In March 2024, the Canadian national citizens’ campaign for proportional representation Fair Vote Canada suffered a data breach. The incident was attributed to “a well-meaning volunteer” who inadvertently exposed data from 2020 which included 134k unique email addresses, names, physical addresses, phone numbers and, for some individuals, date and amount of a donation.

Read More
X