Cloud use is flourishing and with the current pandemic has increased drastically. All new applications are pretty much cloud-based and organizations are starting to notice that service providers do not provide all the security necessary, especially as users may not fully understand the power to lose data via the...
Cybersecurity professionals expect a spike in ransomware attacks against school districts and universities this fall as new hybrid learning environments go online and unpatched equipment that has spent months in the homes of students and faculty is reconnected to school networks.
Increasingly, cyber attacks are taking advantage of privileged accounts, and traditional PAM controls are not enough to defend against them. Tim Keeler of Remediant discusses the role of Zero Standing Privilege and just-in-time privileged account defense.
Jeff Schilling, global CISO at Teleperformance, a Paris-based company offering digitally integrated business services worldwide, describes four principles for mitigating security risks for the remote workforce during the COVID-19 pandemic.
The FBI and CISA warn that hackers are increasingly using voice phishing, or vishing, to target employees who are working from home due to the COVID-19 pandemic, steal their credentials and other data and use the information to launch other attacks or to steal financial data.
The genie is out of the bottle - and working remotely. Global enterprises have fundamentally and permanently changed the way they work. What does this mean as we plan for 2021, and how can organizations automate many of their remaining manual processes? Kelsey Nelson of Okta shares insights.
Implementing an adaptive, risk-based authentication process for remote system access is proving effective as more staff members work from home during the COVID-19 pandemic, says Ant Allan, a vice president and analyst at Gartner.
The latest edition of the ISMG Security Report analyzes why Barclays is being investigated for allegedly spying on its employees. Also featured: How the pandemic is affecting CISOs; an FBI assessment of nation-state threats to U.S. election.
Business resiliency and the supply chain - they both were tested by the disruptions we've all experienced. But Patrick Potter of RSA says there are lessons to be learned from the response, and they will guide us as we prepare for the next evolution of our business climate.
In this eBook, Potter discusses:
What...
The U.K.'s privacy watchdog is probing banking giant Barclays over its use of employee monitoring tools after the bank in February reportedly shifted from anonymized tracking to giving managers the ability to view data for individual employees.
The day after President Trump issued executive orders to ban Chinese-owned social media apps TikTok and WeChat, Sanjay Virmani of the FBI's San Francisco office shared insights on the Chinese cyberthreat, election security and crime trends in the wake of COVID-19.
Users' work environment has changed practically overnight. While many have adapted to the changes, you are likely facing security issues and concerns that weren't present in the office.
Read this guide as it explores the following questions:
What Risks Do We Face With Employees Accessing Applications From...
With unprecedented levels of remote working, organizations have had to respond quickly and prioritize IT and security requirements in a rapidly changing environment. In these uncertain times, organizations will need to be prepared for a variety of challenges to ensure secure operations. Organizations will need to...
Will the COVID-19 pandemic lead to a spike in the number of reported data breaches? Not necessarily, says cybersecurity expert Brian Honan. But he says that the rush to adopt cloud-based services and expanded remote services might change the types of breaches being reported.
It's a new and permanent extended enterprise, as cybersecurity leaders budget for 2021. What are the top threats and vulnerabilities? How have enterprises hardened their endpoint defenses? Stacia Tympanick of VMWare Carbon Black previews a new virtual roundtable.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.