COVID-19 has exacerbated preexisting cyberthreats, from counter incident response and island hopping to lateral movement and destructive attacks. These attacks are ratcheting up existing geopolitical tensions.
Organizations, most of which depend on VPNs and other traditional network security infrastructure, may not...
In this webinar we explore Public Key Infrastructure as a Service (PKIaaS) and how this time-tested solution will provide organizations with a secure certificate-based strategy that reduces the threat landscape. A cloud-based PKIaaS solution can reduce the complexity and expense of a traditional PKI deployment, while...
A hacking group targeting Iranian dissidents has developed malware that can bypass two-factor authentication protection on Android devices to steal passwords, according to Check Point Research. The hackers have also targeted victims' Telegram accounts.
Implementing an adaptive, risk-based authentication process for remote system access is proving effective as more staff members work from home during the COVID-19 pandemic, says Ant Allan, a vice president and analyst at Gartner.
Britain's failure to contain COVID-19 - despite Prime Minister Boris Johnson promising a "world-beating" effort - now includes a failed digital contact-tracing app. A new version, built to work with Apple and Google APIs, may be released by winter. Really, what's the rush?
8 Steps to Shore Up Your Defense Against Cyberattack
In the past, it was easy to take mainframe security for granted. The mainframe was locked down behind closed doors, and even if you were able to get into the room, you'd still needed the coding experience to hack it.
Today, the mainframe is closer to the internet...
NHS England not only manages the standards for healthcare services in England, but the way it operates is seen as hugely influential. Mobility is central to the way NHS England works: almost all its 7,500 staff work from mobile devices. Staff checks emails, shares reports and key documentation internally and with...
Connected medical devices are now an integral part of modern healthcare - from pacemakers and insulin pumps to wearable monitoring devices. However, persistent and unmitigated vulnerabilities in the medical device hardware, networks and applications are putting intellectual property, personal data and patient safety...
For more than a decade, security practitioners have turned to traditional mobile device management (MDM) solutions to secure remote and personal mobile devices. These solutions come with their own challenges as employees are skeptical of what the admins are seeing on their personal devices.
It begs the question: how...
In None We Trust
The Zero Trust model of information security has become a fixture in both the strategies of enterprise security teams and the roadmaps of security solution developers, and for good reason. Perimeter-focused security architectures that default to high trust levels on the internal network continue to...
Connected IoT devices are expected to reach more than 75 billion by 2025. Because of that, reducing cyber risk is increasingly becoming a critical focal point for network and security professionals.
Download the IoT eBook to learn more about:
The new risks posed by consumer-grade IoT devices
How network...
Operational technology (OT) cybersecurity stakeholders and ICS asset owners may have blind spots within their operation that a completely passive ICS cybersecurity solution cannot solve. Incomplete asset information and device visibility resulting from dormant and legacy ICS devices can leave networks exposed to...
Device visibility remains a daunting challenge for the modern enterprise. Forescout provides a multifaceted information technology (IT) and operational technology (OT) platform designed to solve visibility challenges for the modern enterprise by providing complete device discovery and classification, risk assessment,...
"Zero Trust" security is rapidly transitioning from a marketing buzzword to a practical methodology for protecting today's global networks. Stan Lowe, global CISO of Zscaler, shares his 2020 vision for zero trust.
Bolstering medical device security is a top priority at Fort Worth, Texas-based Cook Children's Health Care System, says CIO Theresa Meadows, who's a leader of two cybersecurity advisory groups.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.