Infection numbers are surging in the southern U.S., states and cities are enacting new mask mandates and the fall flu season looms as the great unknown. Sound familiar? COVID-19 is back with the highly contagious Delta variant. Pandemic expert Regina Phelps discusses what that means for business recovery.
These days, people, infrastructure and information are spread out more than ever. This means cloud attacks present a growing cybersecurity risk.
In this executive brief, Frost & Sullivan describes the impact of cloud migration on the enterprise and the top three urgent threats facing the digital workforce.
With corporate America beginning to ask employees to come back to their offices in the fall, cybersecurity teams have the huge task of ensuring that the work environment is safe. This is particularly true of IoT devices, as many have been left unprotected for months.
Global research uncovers IT security leaders’ key strategies for cloud complexity, remote work and supply chain attacks.
Security organizations have always been hard-pressed to keep up with the rising tide of data, the ever-expanding perimeter, and the increasing frequency and sophistication of attacks. Our...
Ransomware-wielding criminals continue to find innovative new ways to extort victims, develop technically and sidestep skills shortages by delivering ransomware as a service, said Robert Hannigan, the former head of U.K. intelligence agency GCHQ, in his Infosecurity Europe 2021 virtual keynote speech.
As organizations prepare a plan for migrating to the Secure Access Service Edge, or SASE, model, they need to carefully assess the need for reorganization of the networking and security departments, says Nat Smith, senior director, security analyst at Gartner, which coined the SASE term.
The Covid-19 pandemic has vastly changed the world and the socioeconomic landscape, and quickly moved the world further online. Identity fraud rates and financial crime followed suit, posing additional challenges for businesses.
In this webinar Veriff co-founder and CPO (Chief Product Officer) Janer Gorohhov...
Advanced persistent threat actors will continue to "up their game," including taking advantage of the COVID-19 pandemic even as its impact diminishes, says Kelvin Coleman, executive director of the National Cyber Security Alliance.
There’s a need now more than ever for security organizations to implement a structured, detailed, and well-practiced incident response plan. As the Navy SEALs training philosophy goes, “slow is smooth and smooth is fast”—a mantra that can, and arguably should, be adopted by all security teams. In incident...
Criminals tricked into using an FBI-run encrypted messaging app, Verizon's 2021 Breach Investigations Report and overcoming the challenges of recruiting cybersecurity professionals are among the latest cybersecurity topics to be featured for analysis by a panel of Information Security Media Group editors.
The Identity Theft Resource Center, a nationally recognized nonprofit organization established to support victims of identity crime, has published new research that shows nearly 30% of people who contact the ITRC are victims of more than one identity crime.
In a recent research project on cyber risk management, 340 cybersecurity and IT professionals were surveyed. They were asked what their organization’s biggest vulnerability management challenge is. 42% of respondents indicated that their biggest vulnerability management challenge is tracking vulnerability and patch...
SmiNet, Sweden’s infectious diseases database, was temporarily shut down last week by the country’s public health agency, Folkhälsomyndigheten, following several attempted cyber intrusions. The shutdown interrupted the reporting of COVID-19 statistics.