The massive shift to remote working as a result of the COVID-19 pandemic means more organizations are adopting the "zero trust" model, taking such steps as implementing proper access controls, monitoring user behavior and building data governance policies.
As organizations around the world have shifted to remote working, security teams are struggling with an unprecedented amount of novel threats originating in the inbox. From stealthy impersonation attempts to domain spoofing attacks targeting concerned teleworkers, traditional security controls are proving ill-equipped...
If your organization handles online transactions with European citizens the eIDAS Regulation presents significant opportunities, but also creates new requirements.
nShield hardware security modules (HSMs) play a vital role in helping to secure eIDAS-compliant solutions that require digital certificates, time stamps,...
Attacks targeting cloud-based data nearly doubled in 2019 as companies shifted more of their valuable information off-premises and misconfigurations and other issues made it more vulnerable, according to the 2020 Verizon Data Breach Investigations Report. Observers expect the trend to continue this year.
The U.S. Treasury's Financial Crimes Enforcement Network is alerting financial institutions about surging COVID-19 themed scams and other "illicit activities," ranging from fraud involving the sale of fake cures, tests and vaccines to price gouging for supplies.
Although FBI technicians were able to gain access to data in two iPhones belonging to a Saudi national who killed three U.S. sailors at a military base in Pensacola, Florida, the Justice Department continues to criticize Apple's refusal to offer law enforcement a backdoor to its encrypted devices.
Business and security leaders accept that a hybrid workforce is the new norm - some staff members based in a central office and many others permanently working at home. But what new cybersecurity demands does this strategy present short-term and into 2021? Our expert panel shares insights.
What should your organization be doing to meet the extraordinary challenges facing IT teams the world over during this time of massive change?
Download this white paper and learn how to:
Shift to a work-from-home model;
Secure a borderless network;
Optimize teams and tool efficiency and achieve overall cost...
The financial services industry sees it all - from credit card fraud to identity theft. To combat these threats, the industry adopts a Zero Trust architecture that also meets consumer and regulatory demands. With Zero Trust in place, you'll improve compliance, visibility and network security.
If security matters...
Join us for a discussion about how cloud deployment planners need to be ever-vigilant for all types of cybersecurity attack vectors. COVID-19 has rapidly transformed how we all work. Organizations need quick and effective user security to address the changing needs of the new normal. The threat environment is...
Covve Visual Network Ltd., a Cyprus-based app developer, acknowledges that it's the owner of 90GB of data - including tens of millions of records - that apparently was left exposed on an open Elasticsearch database. A portion of the data was posted on a forum for trading data leaks.
Besides hospitals and academic institutions, dozens of nonprofits, including nongovernmental organizations - or NGOs - around the world must protect their COVID-19 research and related activities from those seeking to steal data or disrupt their operations, says cyber risk management expert Stanley Mierzwa.
With the outbreak of COVID-19, the demand for remote work has increased exponentially. Working from home presents a different set of cybersecurity challenges with most home offices having off-the-shelf routers with minimal security countermeasures.
The new remote work and remote learner environments provide...
More ransomware-wielding gangs are not just crypto-locking victims' systems, but also stealing and threatening to leak data unless they get their demanded bitcoin ransom payoff. A growing number of security experts believe the strategy is leading more victims to pay.