With corporate America beginning to ask employees to come back to their offices in the fall, cybersecurity teams have the huge task of ensuring that the work environment is safe. This is particularly true of IoT devices, as many have been left unprotected for months.
Global research uncovers IT security leaders’ key strategies for cloud complexity, remote work and supply chain attacks.
Security organizations have always been hard-pressed to keep up with the rising tide of data, the ever-expanding perimeter, and the increasing frequency and sophistication of attacks. Our...
Ransomware-wielding criminals continue to find innovative new ways to extort victims, develop technically and sidestep skills shortages by delivering ransomware as a service, said Robert Hannigan, the former head of U.K. intelligence agency GCHQ, in his Infosecurity Europe 2021 virtual keynote speech.
As organizations prepare a plan for migrating to the Secure Access Service Edge, or SASE, model, they need to carefully assess the need for reorganization of the networking and security departments, says Nat Smith, senior director, security analyst at Gartner, which coined the SASE term.
The Covid-19 pandemic has vastly changed the world and the socioeconomic landscape, and quickly moved the world further online. Identity fraud rates and financial crime followed suit, posing additional challenges for businesses.
In this webinar Veriff co-founder and CPO (Chief Product Officer) Janer Gorohhov...
Advanced persistent threat actors will continue to "up their game," including taking advantage of the COVID-19 pandemic even as its impact diminishes, says Kelvin Coleman, executive director of the National Cyber Security Alliance.
Criminals tricked into using an FBI-run encrypted messaging app, Verizon's 2021 Breach Investigations Report and overcoming the challenges of recruiting cybersecurity professionals are among the latest cybersecurity topics to be featured for analysis by a panel of Information Security Media Group editors.
The Identity Theft Resource Center, a nationally recognized nonprofit organization established to support victims of identity crime, has published new research that shows nearly 30% of people who contact the ITRC are victims of more than one identity crime.
How do you provide secure, reliable wireless network connectivity for staff members who work from home? Solutions must meet the needs of both the IT team and employees.
Check out this Infographic from Cradlepoint to learn more.
When an organisation has mission-critical employees working from anywhere outside the office, technologies they’ve always relied on remain essential, but there are more barriers and variables to contend with.
The company’s visibility into and control of network connectivity and information security is a key...
Using cellular broadband for resilience and uptime in offices, stores, and other fixed locations.
This Whitepaper from Cradlepoint outlines how Wireless WAN links built on LTE and 5G technologies can boost the resilience of your business with six essential branch networking strategies:
Troels Oerting, a veteran CISO who most recently served the World Economic Forum, has a storied career. He's been there, done that and mitigated the risk. In this exclusive conversation, he shares his opinions on today's threats, emerging technologies and challenges for the next generation of security leaders.
Dr. Victoria Baines, a visiting research fellow at Oxford University in the U.K., is acclaimed as one of the country’s most influential women in cybersecurity. In this video interview, she describes potential future cyberthreats as criminals adapt to the changing cybersecurity landscape.
The surge of cyberattacks on the healthcare sector in the midst of the COVID-19 pandemic has accentuated many critical cybersecurity challenges that must be urgently addressed, says Joshua Corman of the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency.
In the past six months alone, we've seen the SolarWinds attack, the Microsoft Exchange Server exploits and the Colonial Pipeline ransomware strike. The threats are more imminent than ever. But Philip Reitinger of the Global Cyber Alliance believes strongly: We created this mess, and we can fix it.