Flavio Aggio of the World Health Organization says that just like technology, humans also require an OS upgrade. Key to this understanding what risks you're taking and then using multiple layers of defense to manage them.
Nearly a year ago, RSA's Chief Digital Officer, Zulfikar Ramzan, sat with ISMG to discuss 2021: A Cybersecurity Odyssey. Which predictions came true, and how have the threat and technology landscapes exploded in unexpected new directions?
Discover the latest trends to see where risks are growing and how you can defend against them.
Results from the Verizon Mobile Security Index (MSI) 2021 report show that 62% of employees currently work remotely—that’s nearly double pre-pandemic numbers.
With remote workers accessing valuable corporate data...
Manoj Sharma has been associated with Symantec for nearly 20 years. But during that time he did not see seismic changes like the ones that have altered the cybersecurity landscape over the past 15 months. He shares insights on how to secure the new extended enterprise.
The latest edition of the ISMG Security Report features an analysis of British spy chief Jeremy Fleming’s "cybersecurity call to arms." Also featured: Insights on COVID-19 business continuity planning; the wisdom of the late Dan Kaminsky.
The U.S. Cybersecurity and Infrastructure Security Agency, Ivanti and FireEye report that federal agencies and other entities have been compromised by two attack groups, with one possibly acting on behalf of the Chinese government. The groups are exploiting vulnerabilities in Ivanti's Pulse Connect Secure.
No script, no filter: Just Microsoft’s Edna Conway and Cisco’s Wendy Nather gathering with privacy leader Michelle Dennedy to discuss the impact of the SolarWinds supply chain attack and to play Buzzword Mystery Date with SASE, CIAM and "passwordless" authentication - are these trends dreamboats or duds?
Remote work isn’t a trend, but a new way for businesses to operate. There’s no longer a defined parameter to operate. Instead, IT teams are coping with multiple devices, networks, locations and ways of enabling employees to access professional applications. Cybercriminals are capitalising on this opportunity.
Does your team have the appropriate secure tools in place to handle the most pressing issues related to a large volume of third-party vendors, internal privileged users and remote workers connecting remotely into your network?
Download this whitepaper to get actionable tips to:
Manage vendor access
Avoid "All or...
As ransomware operators were attacking state and municipal networks alongside hospitals and schools, a global pandemic response to COVID-19 necessitated a move to remote work for a significant portion of the economy. Organizations had to adopt new technologies and quickly scale outside of their normal growth plans.
The new world of "work from anywhere" is all about connecting users to applications. “It’s just different,” says iBoss CEO Paul Martini. Yet, many enterprises still approach this new dynamic with the wrong security mindset. Martini outlines what they’re missing.
Due to the impact of COVID-19, 2020 will be widely regarded as the year that work moved home. In reality, it was the year work moved to the cloud and everywhere in between. As a result, endpoint management and endpoint security are now the cornerstones of effective protection and the foundation for the next generation...
We’ve gone from a remote workforce to “work from anywhere.” How does this create new security challenges regarding the broad and unrestricted accessing of cloud apps? Sasi Murthy of Netskope discusses the path to zero trust data protection.
For the majority of 2020 the entire world grappled with massive change - in how we lived, how we worked, how we connected. Malicious actors took advantage of our need for news on the pandemic and rushed to set up numerous sites to phish for credentials and drop malware - often mimicking content from the CDC, ECDC,...