At a time when cybersecurity leaders are managing business resiliency with the world's largest remote workforce, how can enterprises remain both dynamic and grounded in fundamental security controls? Christopher Kloes of Unisys discusses this challenge.
An emerging technology, Vvendor Privileged Access Management (VPAM) can provide both operational efficiencies and increased security in your projected ROI analysis. And that is a rare combination in InfoSec these days.
The Trump administration is reportedly in talks with tech companies, including Facebook and Google, to explore whether it's possible to use real-time location data from smartphones to support efforts to slow the spread of COVID-19. But some privacy advocates are raising concerns about such tracking efforts.
COVID-19: Modern society has never seen anything like it, and neither have financial markets. Venture capitalist Alberto Yépez analyzes the impact of the disease caused by the new coronavirus on public and private companies' valuations, as well as technology buyers and the threat environment.
As a result of the COVID-19 outbreak, cybercriminals increasingly are targeting organizations that now have more remote workers and fewer IT and security staff at the ready to mitigate hacker attacks and intrusions, security experts say.
In a globally connected world, security can no longer be about the network. It's about the users who access your systems and data. Yet 50% of organisations in Australia and New Zealand don't have a defined Zero Trust strategy.
Read this infographic to learn:
Where your organisation is on the Zero Trust Path;
With U.S. stock markets suffering their worst day since 1987 on Monday, most technology firms took a hit as Wall Street continues to be rattled by the COVID-19 crisis. Experts predict this will drive fresh waves of consolidation and M&A in the cybersecurity market, as well as growth in hot areas.
It's no exaggeration to say that, in the midst of the COVID-19 pandemic, we now have the largest-ever global remote workforce. And with it comes an expanded attack surface that requires extra attention. Phil Reitinger of the Global Cyber Alliance shares five tips for securing the remote workforce.
As businesses constantly evolve and grow, so does an organisation's attack surface. The pace and velocity of technology transformation in enterprises has created a difficult environment for security teams to defend against threats.
Register for this upcoming live webinar and learn how:
Organisations need to adapt...