Rachael Stephens, program director at the National Governors Association, discusses a new report offering insights into ways that governors and state policymakers can nurture a resilient workforce amid technological disruption that's exacerbated by the COVID-19 pandemic.
As many IT teams work overtime to enable remote workers, maintaining security practices and compliance may not be top of mind, but threat actors are actively seeking opportunities to benefit from current circumstances.
Although enabling a remote workforce is typically a common practice, some particularly urgent and...
Money launderers are devising new tactics during the COVID-19 pandemic. For example, some are coming up with ways to use personal protective equipment, or PPE, as a form of currency, says Debra Geister, CEO of Section 2 Financial Intelligence Solutions.
Trending Better. Caution Warranted. Trending Poorly. Uncontrolled Spread. These are the four categories on the latest COVID-19 U.S. map. Pandemic expert Regina Phelps explains how the latest trends should guide our plans for business, education and healthcare in the fall.
The latest edition of the ISMG Security Report analyzes the hacking of high-profile Twitter accounts. Also featured: Addressing security when offices reopen; the role of personal protective equipment, or PPE, in money laundering during the pandemic.
It's been a seismic year for the global economy, and now sector has been immune to the aftershocks. Where does this leave the cybersecurity marketplace, and what is the outlook for market growth and hot technologies as we approach 2021? In this exclusive session, Alberto Yépez of ForgePoint Capital shares insight...
Any and every one is a target for nation-state grade cyber attacks, especially during a global crisis. During times of crisis there is a shift in focus which allows cyber-attacks to grow and intensify, and a large portion of them are nation-state grade. The private sector, all verticals and industries, have always...
As organizations that shifted to a remote workforce consider allowing some workers to return to the office environment, CISOs must reassess their security infrastructures, says Chris Kubic of Fidelis Cybersecurity, who formerly was CISO at the National Security Agency.
The COVID-19 pandemic has highlighted the need for organizations to quickly embrace change and adapt to the "new normal" to maintain business continuity. Greg Foss of VMWare Carbon Black offers insights on how to adapt and survive.
Dallas County, one of the 10 largest counties in the U.S., was accustomed to an entirely on-premises workforce. Then came the pandemic. The Texas county's CISO, Michael Anderson, tells how he planned for business resiliency - and why he owes it all to frameworks.
How have the COVID-19 pandemic, lockdown and job losses affected the character and composition of the internet? Rapid7's Tod Beardsley rounds up the latest research into the prevalence of outdated and unsecured internet protocols and internet-connected devices - and there's both good and bad news.
When life gives you lemons ... As the US threatens to roll back economic re-openings, work life will continue to be upheaved, underscoring an important truth: A distributed, mission-critical workforce requires the right technologies in place to allow work from anywhere. Introducing hundreds of vulnerable entry points...
What are the biggest leadership lessons from the COVID-19 pandemic? And what will CEOs and CISOs look back on and say, "Why did we ever do things that way?" Those questions were posed to a panel of cybersecurity leaders, and here are their candid answers.
COVID-19 contract-tracing applications that help monitor individuals' possible exposure to those who have tested positive for the virus present a variety of privacy issues that must be addressed, says regulatory attorney Nancy Perkins.
Government officials in the U.S., U.K. and Canada issued a joint advisory Thursday warning that a Russian hacking group is targeting various research organizations in those countries involved in COVID-19 vaccine development.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.