The UK's NCSC has published an updated guidance for employees using their personal devices for work. The agency offers technical controls for different types of bring-your-own-device, or BYOD, deployments. And a Bitdefender report stresses the need for good cyber hygiene when using BYOD.
A compromise of sensitive health information affecting nearly 38,000 individuals discovered nearly a year after a terminated company executive accessed the data spotlights some of the top security and privacy challenges covered entities and business associates face with insiders.
They are high-profile, they have access to your
company’s most vital information, they rely on
unsecured personal devices – and your cyber
adversaries are targeting them. They are your
board members, and Chris Pierson of BlackCloak
has ideas on where and how you can better secure
these leaders.
Download...
Healthcare went through five years of transformation over the course of 2020. How does this new telehealth focus most change how healthcare security leaders must view cybersecurity?
In an eBook with Information Security Media Group, Hank Schless of Lookout discusses:
Remote work;
Device security;
Visibility...
Legacy technology. Connected devices. Third-party access risks. Industrial sites face the same IT and OT challenges as other business enterprises, yet often they are overlooked. Michael Shannon of Cisco shares insights on IT/OT convergence and security transformation.
What's that IoT device on your network? A lot of organizations may not know. That's why Gartner analyst Tim Zimmerman says enterprises need to create IoT security policies and governance rules to reduce risk.
CIOs and CISOs have now been charged with
addressing the cybersecurity risks of OT and IoT,
as well as Enterprise IT, environments. Because of
this, they are now looking to establish a holistic
route to cybersecurity management across the
broader technology stack.
Download this whitepaper to learn about what...
Legacy endpoint security approaches are complex, resource-intensive and require multiple point products. Many solutions focus on stopping known attack methods but leave organizations vulnerable to new threats.
It doesn't have to be this way. There is a new, better approach - intrinsic security.
A hacking group targeting Iranian dissidents has developed malware that can bypass two-factor authentication protection on Android devices to steal passwords, according to Check Point Research. The hackers have also targeted victims' Telegram accounts.
Data has a definite lifecycle. Understanding that lifecycle and looking at data through the lens of that life cycle creates new ways of looking and thinking about data and create a language to understand and see new opportunities for the data the organization holds and also perhaps opportunities to dispose of data...
As many IT teams work overtime to enable remote workers, maintaining security practices and compliance may not be top of mind, but threat actors are actively seeking opportunities to benefit from current circumstances.
Download this whitepaper to learn ways to reduce your attack surface, including:
Enforcing least...
Companies are often reluctant to begin their Zero Trust journey because they believe it is difficult, costly, and disruptive but building Zero Trust networks is actually much simpler than building legacy 20th-century hierarchical networks. There is a five-step methodology that, when followed, supports the ease of...
With increasing numbers of mobile users, branch offices,
data, and services located outside the protections of
traditional network security appliances, organizations
are struggling to keep pace and ensure the security, privacy,
and integrity of their networks and, more important, their
customers.
Today, many...
Prisma Access is a Secure Access Service Edge (SASE) solution for securely connecting users anywhere they are, to applications and services everywhere, including the cloud (public and private), SaaS, your data center and the Internet. Prisma Access is delivered as a cloud service, which is capable of inspecting...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.