Cybersecurity researchers are seeing a new trend of hackers using remote access virtual private networks (VPNs) to gain entry to networks. The attackers are exploiting insufficiently protected VPN accounts for access. Experts recommend businesses use authentication beyond simple passwords, such as certificate-based authentication, while some suggest a shift toward Zero Trust Network Access solutions that limit user access and have better integration with identity management systems.

CISOs take the back seat as dev teams claim responsibility for application security
Development and engineering teams are taking the lead in shaping security measures and budget strategies, ensuring that projects align with both security protocols and financial