The modern office is a no longer relevant as a result of the work-from-home surge, says Nathan Howe of Zscaler, who discusses the implications for data security.
In an interview with Nick Holland of Information Security Media Group, Howe discusses:
The demise of the office as we know it;
Why "zero trust" will be...
The 2019 Insider Data Breach survey gathered responses from 252 U.S. and 253 U.K.-based IT leaders (CIOs, CTOs, CISOs and IT Directors) and 2004 U.S. and 2003 U.K.-based employees to assess the root causes of these employee-driven data breaches, as well as the frequency and impact of such instances.
Office 365 provides a solid foundation to which many organizations should add third-party solutions in order to provide higher levels of security, content management, encryption and other capabilities.
Download this Osterman Research report and learn about Office 365's:
Limitations in data loss prevention...
Making data security as people-centric as possible by applying strong risk-based controls is the only way organizations can best secure data while also enabling employees to do their jobs, says Tony Pepper of Egress Software Technologies.
A recent report from Osterman Research has shown that while Office 365 has many benefits, its broad, one-size-fits-all approach means not all information security scenarios and use cases are addressed. As a result, organisations are spending 37% of the average Office 365 deployment budget on complementary third-party...
A former U.S. Air Force counterintelligence agent was indicted for disclosing classified information and helping Iran compromise the computers of other U.S. intelligence agents. The case marks another damaging leak for the American government.
What if organizations' information security practices have gotten so good that they're finally repelling cybercriminals and nation-state attackers alike? Unfortunately, the five biggest corporate breaches of the past five years - including Yahoo, Marriott and Equifax - suggest otherwise.