Page 1 of 1

This needs to be monitored

Posted: Wed Feb 12, 2025 8:43 am
by Rakhiraqsdiwseo
Evernote, Trello or other cloud services are used everywhere within the corporate network, and sensitive company data can be copied to them. , but, according to Mr. Batrankov’s observations, control over the use of such resources is a rare case in corporate information security rules.

Failures in business-critical infrastructures can cause serious financial and/or reputational damage to companies. Disruptions in smart city management systems, transport, medical, energy, industrial and telecommunications systems threaten the health and even lives of millions of people. All this dictates the need to pay special attention to the stable operation of these solutions and the security of the data they process.

Fortinet systems engineer Dmitry Kupetsky claims kazakhstan whatsapp data in modern conditions the concept of the corporate infrastructure perimeter has been practically erased, there are no pre-trusted or isolated segments that do not require additional security measures, which ultimately necessitates the use of new, more effective and deeply embedded information security tools, in particular for IoT, critical information infrastructure and cloud computing.

According to Pavel Korostelyov, Head of the Product Promotion Department at Code Security, the recently adopted Federal Law 187-FZ "On the Security of the Critical Information Infrastructure of the Russian Federation" has a significant impact on the current relevance of information security issues in Russia. He also notes that senior executives of Russian companies, recognizing the urgency of information security tasks in modern conditions, have begun to allocate more resources to their solution, even without regard for regulators' requirements. Mr. Korostelyov also notes the growth of geopolitical risks associated with the increase in the number of cyberattacks organized by state intelligence agencies as an important factor influencing the situation with the state of information security.