The massive shift to remote working as a result of the COVID-19 pandemic means more organizations are adopting the "zero trust" model, taking such steps as implementing proper access controls, monitoring user behavior and building data governance policies.
Business and security leaders accept that a hybrid workforce is the new norm - some staff members based in a central office and many others permanently working at home. But what new cybersecurity demands does this strategy present short-term and into 2021? Our expert panel shares insights.
Join us for a discussion about how cloud deployment planners need to be ever-vigilant for all types of cybersecurity attack vectors. COVID-19 has rapidly transformed how we all work. Organizations need quick and effective user security to address the changing needs of the new normal. The threat environment is...
With the outbreak of COVID-19, the demand for remote work has increased exponentially. Working from home presents a different set of cybersecurity challenges with most home offices having off-the-shelf routers with minimal security countermeasures.
The new remote work and remote learner environments provide...
Organizations must carefully re-examine their security procedures to make sure they're adequate for the new work-from-home environment during the COVID-19 crisis, says Shelton Newsham, a British law enforcement official who specializes in cybersecurity. He reviews key questions to ask.
The latest edition of the ISMG Security Report discusses securing RDP to prevent ransomware attacks. Also featured: A look at three likely scenarios for the COVID19 pandemic, and an analysis of why we're still using PINs for certain card payments.
The COVID-19 pandemic caught many global enterprises by surprise. But as they prepare to emerge from quarantine and reopen their doors, they are taking a thoughtful approach to bolstering cybersecurity for on-premise and remote workers alike. Pamela Kubiatowski of Zscaler shares insights.
For many organizations, digital transformation arrived over a weekend in March. Now they look ahead and wonder "what next?" re: authentication, privacy and third-party risk. In a webinar preview, RSA CTO Zulfikar Ramzan shares his vision of cybersecurity in 2021.
In the current work-at-home environment, keeping the workforce educated about critical cybersecurity practices requires "short, sharp bursts of education" that offer compelling messages, says Vicki Gavin, a former CISO who now serves as a cyber education consultant.
Threat detection and response is a critical piece in an ongoing journey to improve your security program, but feeling confident in your coverage can seem challenging with a remote workforce. When users are remote, they may be operating assets like laptops in potentially hostile networks outside of IT and security's...
In 2020, most new cyber attacks will come through encrypted traffic.
Currently companies, incl. midsize companies have perimeter-based security appliances. But with data and applications moving into the cloud, and the majority of employees in the network accessing corporate data and applications remotely, the...
Enterprises are approaching customer identity and access management from multiple angles, and maturity is growing. These are takeaways from a recent roundtable discussion of CIAM myths and realities. Keith Casey of Okta discusses this event and his vision of CIAM.
What are some best practices for moving network security from the datacenter to the cloud? And what are the essentials of Secure Access Service Edge frameworks, and how can they be implemented? These are among the questions to be discussed in a new series of virtual roundtables hosted by Forcepoint and Homayun Yaqub.
Employee collaboration and productivity take a hit when Zoom calls drop or when Office 365 documents take forever to load, and employee frustration rises. Organizations must ensure that their at-home employees can be as productive as possible while using these bandwidth-intensive tools.
Download this white paper...
With the right planning and actions, companies affected by the COVID-19 outbreak can ensure the safety of their employees while still moving ahead with crucial business objectives.
Download this white paper and learn how to:
Enable direct connectivity via local internet breakouts;
Secure third-party access to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.