In response to the spread of the COVID-19 virus, organizations of all sizes are rapidly scaling their support for a remote workforce. In addition to the strain this puts on IT support and helpdesk teams, it raises critical operational and security challenges. For most organizations, supporting remote employees isn’t...
Deploying a password management solution to select departments of your organization allows risks and vulnerabilities to persist, and even grow. Many applications are not compatible with SSO, and IT may not even be aware that their employees are using certain applications as Shadow IT increases. A password management...
Ivan Milenkovic became the group information security director of Webhelp in January 2020. Six weeks later, the pandemic changed everything. Today, Webhelp is twice the size it was in 2020, and Milenkovic discusses the cybersecurity challenges his team has overcome to support that growth.
Some experts predict cyber insurance rates will increase 40-75% in the near future, and MSPs need to take action now to protect their profits and businesses in 2022 and beyond. The panelists will explore why ransomware attacks are at the heart of these increases. This webinar features expert insights from:
Richard...
John Kindervag, creator of zero trust and senior vice president at ON2IT, and Grant Schneider, senior director at Venable, join ISMG editors to discuss the latest Log 4j findings, threats posed by a Chinese-made automotive GPS tracker and the challenges of a distributed workforce.
The authentication journey is evolving rapidly with no sign of slowing down. Digital transformation, that was already on the rise, has accelerated with the pandemic. With this new business paradigm of hybrid work and an increased usage of digital resources, users including employees and consumers are demanding much...
Four ISMG editors discuss important cybersecurity issues, including the hot topics at ISMG roundtable discussions - such as challenges around software supply chain security, highlights from ISMG's upcoming Healthcare Summit, and how some cybersecurity vendors are creating their own venture funds.
Many of the principles for defending your IT environment apply to industrial control systems (ICS), supervisory control and data acquisition (SCADA) systems and other OT. But securing OT has additional complexities and considerations.
We’ve created this resource guide with more than 80 useful reference links,...
The move to remote working has created two sets of tools, policies and personnel that are making it harder for security teams to protect the enterprise, says Airgap Networks CEO and co-founder Ritesh Agrawal. He discusses how Airgap is addressing the challenges of hybrid work.
Organizations that work with or within the healthcare industry need to prioritize and manage security and privacy-related risk and compliance programs. As the global standard for safeguarding information, HITRUST delivers a scalable, prescriptive, and certifiable framework that enables organizations to demonstrate...
Organizations that work with or within the healthcare industry need to prioritize and manage security and privacy-related risk and compliance programs. As the global standard for safeguarding information, HITRUST delivers a scalable, prescriptive, and certifiable framework that enables organizations to demonstrate...
With the home office as a target, there is an increased risk of losses. Data security incidents cost organizations an average of 4.42 million USD, and an additional 1.07 million USD when remote work is included.
Download the whitepaper to find out:
5 tips for working securely from home;
What are the top risks...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.