Jan. 10, 2024, 12:56 a.m. | John P. Gormally, SR

Security Boulevard securityboulevard.com


Assessing Duplication of Security Controls.



2 min read·Just now

--



Organizations during COVID-19 were placed in a challenging position to deploy newer security controls to meet the immediate of supporting a remote workforce. Many next-generation technologies became deployed parallel to existing solutions, including zero-trust architecture (ZTNA), extended detection and response (XDR), and cloud-based multi-factor authentication.


After COVID-19, many organizational IT and security operations teams continued to support dual security internal controls, contributing to an …

architecture authentication cloud cloud-based controls covid cybersecurity deploy detection detection and response extended detection extended detection and response factor hacking tools managed services mssp multi-factor multi-factor authentication next organizations remote workforce response security security controls solutions technologies trust workforce xdr ztna

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Network Security Engineer

@ Meta | Menlo Park, CA | Remote, US

Security Engineer, Investigations - i3

@ Meta | Washington, DC

Threat Investigator- Security Analyst

@ Meta | Menlo Park, CA | Seattle, WA | Washington, DC

Security Operations Engineer II

@ Microsoft | Redmond, Washington, United States

Engineering -- Tech Risk -- Global Cyber Defense & Intelligence -- Bug Bounty -- Associate -- Dallas

@ Goldman Sachs | Dallas, Texas, United States