Supermarket giant Morrisons is not liable for a data breach caused by a rogue employee, Britain's Supreme Court has ruled, bringing to a close the long-running case - the first in the country to have been filed by data breach victims.
The Global Cyber Alliance is one of 13 nonprofit organizations that have banded together to offer businesses security tips for their newly remote workforces. Andy Bates, executive director of the alliance, discusses the coalition's core guidelines for reducing cyber risk.
Ready for Office 365? Already deployed but running into problems? Either way, there are some secrets to deployment that can put you on the road to success. Even though these tips have been discussed-even by Microsoft-many companies discover deployment problems the hard way.
Download this document learn some of the...
It's time for a new approach to application security
While applications have moved to-cloud and users are accessing them from everywhere, the way enterprises provide secure access to apps has largely remained unchanged. Teams in the midst of a cloud transformation must ensure that their applications remain secure no...
As CISO of SoftBank Investment Advisers, Gary Hayslip is dealing with a familiar crisis management challenge: Supporting a remote workforce, with extra emphasis on secure identities. But he's also keeping a close eye on his team and the risks of burnout.
All businesses ensure that their cloud adoption doesn't outpace their security capabilities.
Download this white paper and use it as a guide through these three phases of secure cloud adoption:
Enabling cloud access;
Adding all users and eliminating local networks.
As the coronavirus drives a massive upsurge in remote working, a review of remote desktop protocol usage suggests RDP adoption hasn't spiked. But as IT teams rely more heavily on remote access, experts warn that too many RDP systems remain internet-exposed.
Hotel giant Marriott, which in 2018 disclosed that it had suffered one of the worst data breaches in history, is now warning that it suffered a new breach earlier this year that exposed personal details - although not payment card information - for 5.2 million customers.
Zero Trust has become a cybersecurity marketing buzzword. But Kelsey Nelson of Okta sheds light on the realities of the Zero Trust approach, with a specific focus on the identity and access management component of the strategy.
One of the greatest challenges when migrating to Office 365 is how to manage identity. Read this 1 minute infographic to learn:
About the most common identity barriers when migrating to Office 365;
How to overcome those barriers;
How to simplify and accelerate your Office 365 deployment.
Gartner recently recognised Okta as a Leader in the "Magic Quadrant for Access Management" for the third year in a row. Additionally, Okta has been placed highest both "Ability to Execute" and "Completeness of Vision" making us the first vendor in the report's history to do so.
Okta believes this recognition from...
The Zero Trust security framework can be summarised in four words: never trust, always verify. In today's mobile and clouddriven world, traditional, network perimeter-oriented approaches to security aren't enough. Companies need to securely enable access for various users - such as employees, partners, contractors,...
Learn why on-demand simulation-based cybersecurity training is essential for security teams in today's threat environment. This white paper defines the simulation-based training market, its training value, and its advantages to security leaders and security team members.
Download this whitepaper to learn about the...
Security practitioners around the world are struggling to cope with the challenges posed by remote workers heavily relying on virtual private networks during the COVID-19 pandemic. Here's a look at steps to take to help enhance security.
If vulnerabilities in 4G cellular networks that can expose them to denial-of-service and other attacks are not addressed, emerging 5G networks could inherit these same issues, the security firm Positive Technologies reports.