Criminals tricked into using an FBI-run encrypted messaging app, Verizon's 2021 Breach Investigations Report and overcoming the challenges of recruiting cybersecurity professionals are among the latest cybersecurity topics to be featured for analysis by a panel of Information Security Media Group editors.
Remote work is changing the landscape of how businesses get work done as they move from an in-office work culture to a work-from-anywhere one. The COVID-19 pandemic has only accelerated this change. Is your business prepared to enable employees to securely collaborate while being physically apart?
View this...
When an organisation has mission-critical employees working from anywhere outside the office, technologies they’ve always relied on remain essential, but there are more barriers and variables to contend with. The company’s visibility into and control of network connectivity and information security is a key...
How do you provide secure, reliable wireless network connectivity for staff members who work from home? Solutions must meet the needs of both the IT team and employees.
Check out this Infographic from Cradlepoint to learn more.
When an organisation has mission-critical employees working from anywhere outside the office, technologies they’ve always relied on remain essential, but there are more barriers and variables to contend with.
The company’s visibility into and control of network connectivity and information security is a key...
Using cellular broadband for resilience and uptime in offices, stores, and other fixed locations.
This Whitepaper from Cradlepoint outlines how Wireless WAN links built on LTE and 5G technologies can boost the resilience of your business with six essential branch networking strategies:
Adding link...
Troels Oerting, a veteran CISO who most recently served the World Economic Forum, has a storied career. He's been there, done that and mitigated the risk. In this exclusive conversation, he shares his opinions on today's threats, emerging technologies and challenges for the next generation of security leaders.
Telehealth, a remote workforce, cloud migration - these were dreams, but not reality for many healthcare CISOs pre-pandemic. Today's a new world, and ChristianaCare CISO Anahi Santiago is happy to be helping to secure it. She discusses security's role in this new innovation.
Dr. Victoria Baines, a visiting research fellow at Oxford University in the U.K., is acclaimed as one of the country’s most influential women in cybersecurity. In this video interview, she describes potential future cyberthreats as criminals adapt to the changing cybersecurity landscape.
In the past six months alone, we've seen the SolarWinds attack, the Microsoft Exchange Server exploits and the Colonial Pipeline ransomware strike. The threats are more imminent than ever. But Philip Reitinger of the Global Cyber Alliance believes strongly: We created this mess, and we can fix it.
If anyone ever doubted the importance of thinking strategically about cybersecurity, laying the groundwork for expected future requirements, then the coronavirus pandemic will have made that clear, says Kerissa Varma, group CISO of Old Mutual Ltd., who offers lessons learned for being "truly resilient."
The COVID-19 pandemic has been referred to as a "great equalizer," and in many ways it is - until it isn't. Forrester analyst Allie Mellen, who has studied regional impacts of COVID-19, shares surprising findings from her research.
From identity and access management to cloud migration and connected devices, retired RSA CEO Art Coviello looks beyond the pandemic and says, "It's going to be a Roaring '20s for technology." But he also foresees a potentially calamitous decade for security.
As CISO of Johnson & Johnson, Marene Allison was used to gauging her security posture by the top threat activity: nation-state, cybercrime, insider or hacktivist. But in 2020, they all struck at once. Here is one CISO's take on the state of the industry.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.