Remote work isn’t a trend, but a new way for businesses to operate. There’s no longer a defined parameter to operate. Instead, IT teams are coping with multiple devices, networks, locations and ways of enabling employees to access professional applications. Cybercriminals are capitalising on this opportunity.
To help mitigate the risks of state-sponsored cyberattacks against India's critical infrastructure - and improve detection and response - requires industry collaboration and information sharing, root cause analysis with specialized forensics, and better testing of code, a panel of experts says.
The adoption of the Secure Access Service Edge, or SASE, model is being driven by numerous factors, including the need to bring down administrative costs and to effectively manage network security, according to a panel of experts who offer implementation advice.
The latest edition of the ISMG Security Report features an analysis of recent “tell-all” interviews with members of ransomware gangs. Also featured: insights on securing IoT devices and mitigating insider threat risks.
To help prevent and defend against emerging cyberthreats, CISOs must develop a multi-line defense strategy and invest in threat-hunting capabilities and orchestration, a panel of cybersecurity experts advises.
Recent research highlights the growth in risky remote work behaviors. Dr. Margaret Cunningham of Forcepoint X-Lab discusses the implications of this increase in insider threats and shares risk mitigation strategies.
A Russian national who conspired to extort millions from electric car manufacturer Tesla by trying to plant malware in the company's network has pleaded guilty to a single federal conspiracy charge, according to the U.S. Justice Department. The FBI thwarted the plot before it could be carried out.
Insider risks are one of the top concerns of security and compliance professionals, and industry studies have shown that insider risks are often associated with specific user events or activities. Protecting your organization against these risks can be challenging to identify and difficult to mitigate. Insider risks...
To assist organizations with making actionable decisions on the adoption of contextually-aware platforms, Enterprise Management Associates (EMA) conducted primary, survey-based research on the current requirements, use, and outcomes of utilizing contextually-aware identity and access management (IAM) solutions.
Vulnerability management is more than assessment scanning. It involves the understanding of risk and the integrating of people and processes to remediate the most sensitive assets in the network.
Download this report to understand how enterprises must automate vulnerability prioritization and remediation. Moreover,...
Changes in work environments, including the transition to remote working, have led to an increase in demand for assessing and managing insider risk. Security and risk management leaders should evaluate how insider threat solutions can support their security objectives without alienating their workforce due to privacy...
What action can companies take to help prevent occupational fraud by insiders? Ganeshwaran Thuraisingham of the Association of Certified Fraud Examiners shares some important steps taken by the association in the APAC region to build awareness of emerging fraud trends and how to mitigate risks.
Does your organization have a plan in place if one of your employees is accused of being an insurrectionist? If your software was being used to spread plans for a riot, could you detect that? Threat modeling expert Adam Shostack discusses how companies should be prepared to respond to issues in the news.