Portnox Blog
Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.
Blog, Compliance & Regulations, Network Security, Security Trends
Cybersecurity Legislation: What US Organizations Need To Know About CIRCIA Compliance
There’s no shortage of high-profile cybersecurity incidents hitting the news every week. In 2021, we saw a leading energy supplier shut down a major eastern US fuel pipeline in response to a cyber attack. In the same year, a major US insurance carrier fell victim to a costly ransomware attack that resulted in thousands of…
Read more» Blog, Compliance & Regulations, Cyber Threats, Security Trends
The New US Cybersecurity Act & What it Means
If you face a major cyber attack or pay ransom to attackers, you may have to report it to the Cybersecurity and Infrastructure Security Agency (CISA) within a certain timeframe under the new cybersecurity law . The Strengthening American Cybersecurity Act of 2022, which became law in March 2022, imposes strict reporting obligations on critical…
Read more» Blog, Compliance & Regulations
What Credit Unions Need to Know About the NCUA ACET & its New Cybersecurity Standards
NCUA ACET & its New Cybersecurity Standards With Internet of Things (IoT) and Bring Your Own Device (BYOD) growing exponentially every year, financial institutions stand to see key benefits in facilities cost reduction and employee productivity. But credit union executives must also ask – what are the unseen risks of becoming more connected? For example,…
Read more» Blog, Compliance & Regulations, webinars
WEBINAR: How Credit Unions Can Ensure Secure Remote Network Access
As the NCUA audits continue to expand, many credit unions struggle with finding an effective solution to meet Domain 3 controls within the ACET framework. In this webinar, co-hosted by Portnox and Btech, find out how Portnox CLEAR is providing the remote network access control, off-campus endpoint awareness, risk and real-time remediation capabilities that either directly…
Read more» Compliance & Regulations, Network Security, News, Portnox Technology
How NAC and CIS Controls Go Hand-in-Hand
To help organizations select and implement a set of cyber defense best practices that will protect against today’s most pervasive and dangerous threats, the Center for Internet Security (CIS) devised a list of 20 controls. A principal benefit of the CIS Controls is their ability to prioritize and focus on a smaller number of actions…
Read more» Blog, BYOD, Cloud, Compliance & Regulations, Network Access Control, Network Security
The Best Ways to Secure Device Onboarding in The Enterprise
With the prevalence of digital transformation in the enterprise, there is a clear necessity to balance IoT security issues and BYOD security measures that will prevent suspicious or malicious devices from gaining access to the enterprise’s assets and data centers, while at the same time, making sure that productivity and easy onboarding of devices is…
Read more» Compliance & Regulations, Network Security
Compliance is a Strategy for Success
As the nature of compliance grows increasingly complex, it becomes more difficult for companies to understand what applies to their business and how to build and implement protocols. Furthermore, as cyber threats grow exponentially, companies are facing problems like potential governmental fines and financial theft, breach of sensitive data and loss of clientele. Author of…
Read more» Compliance & Regulations, Network Security
Cyber Attacks ≠ Compliance
In our recent “Cyber Threats Cannot Compete with Strong Compliance” blog, we covered cyberattacks in the financial and retail industries and the importance of visibility, network access and control, and risk management to achieve strong compliance, defend against cyberattacks, and grow a successful and secure business. In this blog, we take a quick look at…
Read more» Compliance & Regulations, Network Security
Cyber Threats Cannot Compete with Strong Compliance
2016 saw several high profile cyber-attacks, which resulted in costly breaches and damages to reputable companies and corporations. There have been several discussions in how to effectively preempt such cyber-attacks with solutions ranging from firewalls, endpoint device security, to network access management solutions. Mindful that many industries maintain tough regulatory standards, companies are now required…
Read more»