Connect with us


Security Models of Tomorrow for Work From Anywhere




By Sean Duca, Regional CSO, JAPAC

In the early spring of 2020, as the world shifted to work remotely, security models used by many organizations were put to the test.

Remote work was not a new thing, but never before had it been needed at the same scale and urgency. While many organizations used to have some employees working remotely, few were ready for everyone to be remote. The big question facing all organizations was how to maintain business continuity.

Falling back on using VPN to enable secure remote connectivity worked in some instances. Few were lucky and ordered additional licensing, but many were not, as compute infrastructure could not meet such an increased workload. For the many, it was too late to make any significant changes, so they had to ride the storm, work within the constraints of what they had, and plan for a refresh of technology at the first given moment of respite. With scalability being a significant challenge around VPNs, the bigger issue is that many applications used in organizations today reside in the public cloud or are SaaS applications. Perhaps due to these shortcomings, in recent months, an increasing number of organizations have started to examine different ways of enabling secure connectivity out to the edge and the cloud.

Yesterday’s Security Model Isn’t Right for Tomorrow

In the past, secure remote connectivity was fixed and finite. Organizations would typically allow only a certain number of people to connect to the VPN appliances, restricted by licenses. Those remote connections were also fixed, but the applications were set in terms of their location.

Things move far too rapidly to have fixed resources in place in the modern world, and no one knows what tomorrow holds. As a result, flexibility will reign wherever people work, whether in the office, at home, or anywhere in between, for the foreseeable future.

Applications are also on the move. Gone are the days when most of an enterprise’s applications reside entirely within the four walls of its own data center. Instead, applications and data today reside everywhere: on-premises, in the cloud, and at the edge. As a result, a single enterprise perimeter no longer exists.

Securing the Pervasive Perimeter

If the enterprise uses 25 different SaaS-based applications, the enterprise needs to secure each of those tiny data islands out there. Every application and data source needs to be secured. The enterprise must have visibility into how every user is accessing resources, whether they are in the office or remote.

For me, the whole work-from-anywhere model in the hybrid workplace that we have now got comes down to two key things: the need to secure user access and to provide users with what they require to connect to whatever resources are necessary. The remote connectivity needs to be as secure as if the user was sitting in the corporate office. They need to consume everything the same way, at that same level of security.

Inside the four walls of the enterprise, there are typically various security solutions protecting users. That is part of the reason the notion of just having a VPN for providing connectivity to enable remote work falls short. Instead, enterprises must have a degree of inspection and a level of security rigor to minimize the risk that organizations face every day.

Get Out of the Shadow (IT)

To be fair, all the controls that enterprise IT placed on users didn’t always work either. For example, a common challenge with centrally secured IT resources is the issue of shadow IT, where users would go around their IT departments if they couldn’t get the resources they needed.

As we’re thinking about the security models of tomorrow, it’s an opportunity to try and step out of the shadows. Now is the moment to work closely with our users to determine which applications they use and want—ones that will make them more productive—by leaning in, talking to users, and soliciting as much feedback as we can. Why? Because sometimes, we don’t know all the answers until we ask.

Shadow IT was always about productivity. Embracing a security model that supports the way users want to work, with the applications they need, will let them do their jobs better.

Survive. Thrive. Optimize.

The first phase of enabling remote work in the face of the pandemic was just about survival and making sure work could continue. The second phase was all about making the best of the situation and attempting to thrive. Now it’s time to optimize and build out the security model of tomorrow for work from anywhere to reality.

Providing a secure model for hybrid work requires agility, and it demands scalability. Gone are the days when security and remote work was only enabled by boxes and fixed licenses that limited the ability of organizations to support hybrid work properly.

What is needed is an always-on model that is cloud-delivered, available on-premises and at the edge. In addition, it is a model that should scale up in terms of resources and capabilities as needed

The secure access service edge (SASE) approach is a great model for enabling hybrid work with software-enabled paths. Layering in Zero Trust with SASE helps protect the pervasive perimeter and the various silos of applications and data that users access every day.

It is unknown what the world of tomorrow will be. Who knows what it will throw at us, but we know that there is a need to be nimble and agile. Security needs to be flexible and elastic to wrap around users’ needs, wherever they are, and no matter how they access applications.

Learn more about maintaining a secure hybrid workforce with a holistic cybersecurity platform.



China’s Economy Grows Despite Int’l Challenges: Turkish Expert




© Provided by Xinhua

China would continue to contribute to the global economy, especially with the Belt and Road Initiative, and the Regional Comprehensive Economic Partnership (RCEP) agreement, said Turkish economist Sinan Alcin.


Original Article:

Continue Reading


UK PM Boris Johnson Arrives in India for Two-day Visit




Ahmedabad (Gujarat) [India], April 21 (ANI): UK Prime Minister Boris Johnson on Thursday landed in Gujarat’s Ahmedabad for a two-day visit to India with focus on stepping up cooperation in the Indo-Pacific, giving momentum to negotiations on Free Trade Agreement (FTA) between the two countries as well as enhancing defence ties.
Johnson started his visit from Ahmedabad where he is scheduled to meet with leading business gr

Original Article:

Continue Reading


Senate Panel Advances Sandra Thompson’s Nomination As FHFA Director




The Senate Committee on Banking, Housing and Urban Affairs confirmed the nomination of Sandra Thompson to serve as the next director of the Federal Housing Finance Agency, sending her nomination to the full Senate.

The vote passed 13 to 11, with all 12 of the committee’s Democrats and one Republican voting in favor of advancing Thompson’s nomination.

During the session, the committee also approved the re-nomination of Federal Reserve Chair Jerome Powell, the nomination of Federal Reserve Gov. Lael Brainard to be Vice Chair, and Philip Jefferson was confirmed as a member of the Federal Reserve.

Lisa Cook’s nomination to be a member of the Federal Reserve concluded in a tie. Cook, if confirmed by the full Senate, would be the first Black woman to serve on the Federal Reserve board.

Thompson in a statement said that she appreciates the support from Committee members and looks “forward to continuing to work with Congress as [she] fulfills [her] current role as Acting Director while the nomination process proceeds.”

In February 2022, the confirmation process of Thompson and a handful of Fed nominees stalled after Senate Republicans boycotted the vote.

At the time, Pennsylvania Sen. Patrick Toomey, the ranking Republican on the committee, critiqued the nomination of Sarah Bloom Raskin, who was nominated to be vice chair for supervision of the Federal Reserve.

Toomey questioned Raskin’s ties to Reserve Trust Company, a Colorado-based fintech startup that gained access to the Fed’s payment system in 2018. After Democratic West Virginia Sen. Joe Manchin said he would not vote for Raskin due to her views on climate change, Raskin withdrew her nomination.

The committee’s confirmation of Thompson, who has been leading the FHFA since June 2021, will be welcome news to many industry stakeholders and affordable housing advocates who have been calling on her confirmation.

Bob Broeksmit, president of the Mortgage Bankers Association, called Thompson “a breath of fresh air” during the ICE Experience Conference in Las Vegas this week.

“Her administration is really focusing on the ways in which Fannie Mae and Freddie can achieve its mission to make homeownership available and affordable to low- to- moderate income borrowers and to black and Hispanic borrowers who own homes at shamefully lower rates in this country, than people who look like me,” he said. “And I think that Fannie and Freddie, under Sandra Thompson’s direction, will come up with some really innovative ideas.”

Early on in her tenure leading the FHFA, Thompson said that she would prioritize sustainable lending practices and expand credit to underserved communities.

“As a longtime regulator, I am committed to making sure our nation’s housing finance systems and our regulated entities operate in a safe and sound manner,” Thompson said in June 2021, when she was appointed acting director. “We can accomplish this, and at the same time have a laser focus on mission and community investment. There is a widespread lack of affordable housing and access to credit, especially in communities of color.”

Since then, Thompson has made substantial headway. Within three months of her tenure, she set new affordability benchmarks to expand access to credit in underserved communities, made on-time rental payment history part of Fannie Mae’s underwriting process and signed a historic interagency fair lending agreement.

The post Senate panel advances Sandra Thompson’s nomination as FHFA director appeared first on HousingWire.


Continue Reading