The modern office is a no longer relevant as a result of the work-from-home surge, says Nathan Howe of Zscaler, who discusses the implications for data security.
In an interview with Nick Holland of Information Security Media Group, Howe discusses:
The demise of the office as we know it;
Why "zero trust" will be...
You want to enable your global workforce to work from anywhere on any device, with the digital access needed. But, you must constantly guard against a sophisticated range of possible cyber attacks including identity-based and pervasive unknown threats. Addressing such threats requires understanding the financial,...
To successfully combat today's varied and sophisticated threats, a proactive approach is needed. EPP's essentially reactive approach to computer security is, to use the old canard, necessary but insufficient. While it' s essential to take an AV-based preventive approach to eliminate as many threats as possible before...
After business, as usual, has been disrupted, the path to stability is a challenging one to negotiate. The steps, timing, and impacts inevitably will vary. Regardless of your organization's state of readiness, it is critical to exercise sound risk management and follow best practices for business resiliency....
DevSecOps is in its "awkward teenage years," says Matthew Rose of Checkmarx. But with new tooling and automation - particularly application security testing tools - he sees the practice maturing quickly and delivering improved outcomes.
In an interview with Information Security Media Group's Tom Field, Rose...
The Future of Unified Workplace Access
A Vision for a Unified Physical Identity and Access Management for Financial Institutions Vision for a Unified Physical Identity and Access Management for Financial Institutions
Banks and financial institutions are undergoing a physical transformation and rebirth. As cyber...
You want to enable your global workforce to work from anywhere on any device, with the digital access needed. But, you must constantly guard against a sophisticated range of possible cyber attacks including identity-based and pervasive unknown threats. Addressing such threats requires understanding the financial,...
After business, as usual, has been disrupted, the path to stability is a challenging one to negotiate. The steps, timing, and impacts inevitably will vary. Regardless of your organization's state of readiness, it is critical to exercise sound risk management and follow best practices for business resiliency....
To successfully combat today's varied and sophisticated threats, a proactive approach is needed. EPP's essentially reactive approach to computer security is, to use the old canard, necessary but insufficient. While it' s essential to take an AV-based preventive approach to eliminate as many threats as possible before...
You've read the daily headlines about security misfortunes of businesses and government organizations. The digital age (AKA the rising adoption of the internet, cloud apps, IoT, and even public WiFi) is creating an even easier playing field for cybercriminals. And the web traffic flowing through these new technologies...
As organizations continue to drive business practices through digital transformation, the challenges they face evolve as well. With large numbers of employees and students working from home, businesses are facing increasing risk of becoming victims of cybercrime.
The NTT Ltd. 2020 Global Threat Intelligence...
As organisations continue to drive business practices through digital transformation, the challenges they face evolve as well. Cybercriminals are among this group. With large numbers of employees and students working from home, businesses are facing increasing risk of becoming victims of cybercrime.
Download the...
The war on ransomware is real. Today's organizations need to have a strong, multi-layered defense and strategy to address ransomware. In this paper, Rick Vanover from Veeam® will provide organizations with practical steps they can take to protect data and avoid being in a situation where data loss or ransom payment...
The ransomware threat has scaled up to match the new remote workforce. But have backup policies and incident recovery procedures improved to keep pace?
Download this eBook to learn more about:
Ransomware recovery challenges;
Securing a remote file-sharing environment;
Business continuity successes in crisis...
Every organization must go the extra mile to protect their customers, partners and employees during these unprecedented and uncertain times.
This executive guide to the NTT Ltd. 2020 Global Threat Intelligence Report identifies the unique challenges industries in EMEA face, and the operational, tactical and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.