The world has experienced an unprecedented business disruption that instantly created the largest remote workforce - and largest attack surface - in history. How do you validate users and access in this new dynamic workforce? RSA's Steve Schlarman and Ben Smith preview an upcoming series of virtual roundtables.
This whitepaper report looks in detail as to why achieving compliance across a wealth of new international data privacy laws and regulations is such a growing challenge. It will cover:
How data breaches are driving regulatory change
Data protection and the COVID-19 pandemic, an escalating external threat...
In the aftermath of the COVID-19 pandemic, the abruptness and unprecedented scale at which organizations have advised employees to work remotely, has given rise to complex and widespread IT security challenges; bringing into sharp focus the lack of preparation to meet such contingencies, and the pervasive...
The latest edition of the ISMG Security Report analyzes why cyberattacks against banks have surged in recent weeks. Plus: The increasingly ruthless tactics of ransomware gangs; cybersecurity strategies for small businesses.
How organizations in the most demanding and complex environments are leveraging Tanium to build resilience, maintain business continuity, and manage their long-term risk for today, tomorrow, and the new normal.
This paper discusses:
Endpoint Management and Security in the Age of COVID-19
Why Internal Endpoint...
The remote workforce brings more flexibility. But it also comes with unique challenges such as VPN congestion, a greater attack surface and a lack of visibility for security. How can you help remote workers to be both productive and cybersecure? Menlo Security's Kowsik Guruswamy offers advice.
"Hack for hire" groups operating in India are spoofing World Health Organization emails to steal credentials from financial services and healthcare firms around the world, according to Google's Threat Analysis Group.
As cyberthreats to medical research on COVID-19 - and other intellectual property - grow, organzations must take critical steps to prevent the theft of their "innovation capital," says Russell Koste, chief security officer of Alexion Pharmaceuticals.
A federal watchdog agency has established key goals and objectives - including protecting the security of IT infrastructure as well as combating fraud - that drive its oversight of the Department of Health and Human Services' COVID-19 response and recovery activities.
As a result of the COVID-19 pandemic, work-from-home employees have rushed to adopt videoconferencing tools. But Kroll's Alan Brill warns that sound security and privacy practices - backed by legal, risk management and HR teams - too often lag. Here are his top concerns and tips on how to address them.
Ransomware, wire transfer fraud, destructive attacks: In recent months, the financial sector has seen these and other online attacks surge by 238% as criminals continue to exploit the pandemic, warns Tom Kellermann of VMware Carbon Black, who shares findings from his firm's third "Modern Bank Heists" report.
As organizations continue to enable remote access for their staffs to meet and recover from shelter-in-place mandates, setting and meeting remote workforce objectives is crucial. Optiv recommends employing proven strategies - like expanding what you currently have, creating alternative access methods and redesigning...
COVID-19 impacts how organizations operate and inflicts new cybersecurity challenges on infrastructure capacity and traditional controls. The changes made since the outbreak, such as mandated remote work, spotlight resilience planning efforts. Many controls that can normally be enforced in internal network...
A bipartisan group of U.S lawmakers is requesting more information from the FBI and CISA about efforts to crack down on hacking groups linked to China's government that are targeting American facilities conducting COVID-19 research.
Two years after it was last seen in February 2018, ZLoader banking malware has resurfaced, with cybercriminals wielding a new version that gets distributed via email campaigns, security firm Proofpoint warns.