Jamf plans to buy startup ZecOps to extend its ability to detect and respond to sophisticated threats across Mac, iOS and Android devices. Jamf's proposed acquisition will provide threat hunting tools to determine if any advanced attacks have compromised mobile devices.
The world of work has changed. For businesses. For leaders. For employees. Remote jobs now make up more than 15% of the total opportunities in the U.S. and as we look to the future, one fact becomes clear: remote work is here to stay.
Companies have shifted their strategies to allow for long-term remote or hybrid...
The basic idea behind zero trust is the assumption that all devices and users are untrustworthy until proven otherwise.
Often associated with an identity-centric perimeter, zero trust network access (ZTNA) architecture helps organizations reduce their attack surface by eliminating network-layer risks, but is not...
The demand for anywhere, anytime
access has grown as the workforce has
become more distributed and cloud
traffic continues to soar.
How can IT leverage a simpler, more
scalable method to securely connect
users to the applications they need?
By bringing network and security
functions closer to users and...
Enterprises need to securely enable hybrid working to attract and retain talent, says Naveen Palavalli, vice president of product strategy at Netskope. He explains how this will require network and cloud transformation as well as transformation around how data is accessed and shared.
NortonLifeLock and Avast completed their $8.6 billion merger Monday, forming a $3.5 billion consumer cyber protection behemoth with expertise across security, privacy and identity. The fully merged company will have fewer than 4,000 employees and will initially go to market as NortonLifeLock.
Anand Atre began his role as deputy CSO of Crux Informatics soon after the start of the COVID-19 pandemic, and he soon confronted the challenge of how to properly secure a hybrid workforce. He outlines his strategies for cybersecurity and employee education.
A new (ISC)² member pulse survey on remote work policies in 2022 found that cybersecurity professionals who get to choose where to work are the most satisfied, while those being forced back into the office are the least satisfied. The association advises firms to discuss options with employees.
In response to the spread of the COVID-19 virus, organizations of all sizes are rapidly scaling their support for a remote workforce. In addition to the strain this puts on IT support and helpdesk teams, it raises critical operational and security challenges. For most organizations, supporting remote employees isn’t...
Deploying a password management solution to select departments of your organization allows risks and vulnerabilities to persist, and even grow. Many applications are not compatible with SSO, and IT may not even be aware that their employees are using certain applications as Shadow IT increases. A password management...
Ivan Milenkovic became the group information security director of Webhelp in January 2020. Six weeks later, the pandemic changed everything. Today, Webhelp is twice the size it was in 2020, and Milenkovic discusses the cybersecurity challenges his team has overcome to support that growth.
Some experts predict cyber insurance rates will increase 40-75% in the near future, and MSPs need to take action now to protect their profits and businesses in 2022 and beyond. The panelists will explore why ransomware attacks are at the heart of these increases. This webinar features expert insights from:
Richard...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.