The divide between mobile app detection and IAM has fueled cyber incidents and breaches as remote work has expanded. Workers using personal smartphones don't want to install corporate endpoint management products but still need to ensure both user and device are protected, says RSA CEO Rohit Ghai.
The shift to remote work introduced new security risks for Piedmont Healthcare since workers could no longer rely on the firm to protect their information. Employees need to understand the security issues associated with connecting to the network using personal devices, says CISO Monique Hart.
Ninety-four percent of recent survey respondents are concerned that TLS 1.3 will break their existing security controls. With the ever-expanding amount of encrypted network traffic mandated, it’s important to understand how to balance user and customer privacy with security controls. Join experts from Cisco Security...
The shift to remote work during COVID-19 has prompted hackers to dramatically boost phishing attacks. The pandemic has led to users reading more corporate email on personal devices and opening messages while distracted by children or pets, increasing the chances they'll click on something malicious.
Cloud computing is experiencing accelerated growth. So is the number of remote users and the types of devices. It all adds up to a complex, expanding attack surface with increased cybersecurity risks, and adversaries are constantly thinking of new ways to attack. Now more than ever, SecOps teams need to ensure they're...
Jamf plans to buy startup ZecOps to extend its ability to detect and respond to sophisticated threats across Mac, iOS and Android devices. Jamf's proposed acquisition will provide threat hunting tools to determine if any advanced attacks have compromised mobile devices.
The basic idea behind zero trust is the assumption that all devices and users are untrustworthy until proven otherwise.
Often associated with an identity-centric perimeter, zero trust network access (ZTNA) architecture helps organizations reduce their attack surface by eliminating network-layer risks, but is not...
The demand for anywhere, anytime
access has grown as the workforce has
become more distributed and cloud
traffic continues to soar.
How can IT leverage a simpler, more
scalable method to securely connect
users to the applications they need?
By bringing network and security
functions closer to users and...
How can a platform-led security approach improve employee and customer experiences? Mindtree CISO Chandan Pani describes how an integrated security approach helped him transform his organization from the pre-COVID-19 era to a hybrid, no-perimeter era that focuses on both security and productivity.
NortonLifeLock and Avast completed their $8.6 billion merger Monday, forming a $3.5 billion consumer cyber protection behemoth with expertise across security, privacy and identity. The fully merged company will have fewer than 4,000 employees and will initially go to market as NortonLifeLock.
InfoSec, IT risk and digital supply chain management professionals know the key to minimizing the risk of third-party breaches is to implement a comprehensive and efficient third-party security risk management (TPRSM) process.
Join this webinar where Dov Goldman discusses the increasing challenges surrounding...
As ransomware attacks grow, cyber insurance costs are skyrocketing, leaving small to midsized firms with tough decisions about insuring against threats, beefing up security and whether to pay or not pay ransom demands, says Diktesh Singh Puri, IT and cloud operations head at Reckitt Benckiser Group.
Anand Atre began his role as deputy CSO of Crux Informatics soon after the start of the COVID-19 pandemic, and he soon confronted the challenge of how to properly secure a hybrid workforce. He outlines his strategies for cybersecurity and employee education.
Ben Goodman, Okta's Asia-Pacific senior vice president and general manager, explains why critical infrastructure companies lag behind born-in-the-cloud companies in zero trust adoption. He expects traditional industries to adopt zero trust for some application services and then expand into others.
A new (ISC)² member pulse survey on remote work policies in 2022 found that cybersecurity professionals who get to choose where to work are the most satisfied, while those being forced back into the office are the least satisfied. The association advises firms to discuss options with employees.