What are some best practices for moving network security from the datacenter to the cloud? And what are the essentials of Secure Access Service Edge frameworks, and how can they be implemented? These are among the questions to be discussed in a new series of virtual roundtables hosted by Forcepoint and Homayun Yaqub.
Cognizant estimates that the April ransomware attack that affected its internal network will cost the IT services firm between $50 and $70 million, according to the company's latest financial report. The company has said that the Maze ransomware gang was behind the attack.
The Covid-19 crisis has forced businesses of all sizes around the world to change operations in a variety of unprecedented ways.
To navigate and halt the spread of the pandemic, organizations have adopted strict remote work policies where employees have to maintain work and productivity from the confines of their...
Over the past couple of decades we have seen the number of employees that work from home increase dramatically. Today, due to COVID-19 quarantine policies around the globe, many companies are faced with a new paradigm--employees must work from home for an undefined period of time.
At OneLogin, our primary focus is...
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.
Authenticate users for any application, any directory and any situation
Identity and access management is a key foundational technology that can make or break a business' digital transformation initiatives. Identity ensures that digital interactions are secure and seamless across the enterprise, and a...
As many IT teams work overtime to enable remote workers, maintaining security practices and compliance may not be top of mind, but threat actors are actively seeking opportunities to benefit from current circumstances.
Download this whitepaper to learn ways to reduce your attack surface, including:
Enforcing least...
The Zero Trust hype train is in full swing. It seems as though every vendor is touting a complete solution or silver bullet. The truth is that achieving "full" Zero Trust with any single technology is simply not possible. However, there are some practical steps that can move your organization towards a Zero Trust...
A recently uncovered phishing campaign is spoofing notifications from Microsoft's Teams collaboration platform in order to harvest Office 365 credentials from employees working from home offices because of the COVID-19 pandemic, according to research from Abnormal Security.
The shift to working at home is opening the door to cybersecurity incidents. Some 23% of respondents to a small survey conducted by the training organization (ISC)2 say their organization has experienced an increase in cybersecurity incidents since transitioning to remote work.
The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.
The number of brute-force attacks targeting RDP connections has spiked since the COVID-19 pandemic forced employees all over the world to work at home, according to an analysis from security firm. These types of attacks can lead to malware infections, cyber espionage and other threats.
Security teams are facing a worst-case scenario - juggling identity and access management while detecting threats for an infrastructure that is no longer within the safe confines of their castle walls.
The fastest to react to this tectonic shift have been the hackers. How are they planning their attacks? What can...
These days, more of your people-maybe even your entire workforce-are working from home. Your operations have shifted, and your cybersecurity needs to, too. But even as the potential for risk widens amidst a rapidly evolving threat landscape, you can help keep your enterprise safe and your people...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.