The new world of "work from anywhere" is all about connecting users to applications. “It’s just different,” says iBoss CEO Paul Martini. Yet, many enterprises still approach this new dynamic with the wrong security mindset. Martini outlines what they’re missing.
Due to the impact of COVID-19, 2020 will be widely regarded as the year that work moved home. In reality, it was the year work moved to the cloud and everywhere in between. As a result, endpoint management and endpoint security are now the cornerstones of effective protection and the foundation for the next generation...
We’ve gone from a remote workforce to “work from anywhere.” How does this create new security challenges regarding the broad and unrestricted accessing of cloud apps? Sasi Murthy of Netskope discusses the path to zero trust data protection.
The rush to operationalize remote work did not afford the time to conduct the usual level of due diligence associated with a range of issues such as scaling VPN infrastructure, tightening access/authentication policies and process and vetting personal devices not configured to corporate standards.
However, while...
Organisations are embracing the work from home reality by accelerating their digital transformation initiatives and shift to the cloud. To empower their remote workforce and improve business efficiencies, software-as-a-service (SaaS) solutions are helping organisations deliver rapid time to value and enhance user...
Recent research highlights the growth in risky remote work behaviors. Dr. Margaret Cunningham of Forcepoint X-Lab discusses the implications of this increase in insider threats and shares risk mitigation strategies.
2020 was a culmination of market shifts that has become a catalyst for the adoption of Identity Governance and Administration (IGA)—from work from home to the implementation of a zero-trust strategy.
In a new survey from Omada and Enterprise Strategy Group, 93% of your peers agree that the COVID-19 outbreak has...
With the explosion of remote business, we are now digitizing many of our documents and processes. Entrust’s Jay Schiavo explains what new mindset this shift requires, what’s needed to ensure document authenticity and integrity.
The latest edition of the ISMG Security Report features cybercrime deterrence lessons learned from the disruption of the Emotet botnet operation. Also featured: An update on attacks tied to Microsoft Exchange flaw exploits; a discussion of the need to update business continuity plans.
This edition of the ISMG Security Report features an analysis of key takeaways from the breaches tied to flaws in the Accellion File Transfer appliance. Also featured: Equifax CISO Jamil Farshchi on transforming supply chain security, plus an analysis of how "work from anywhere" is affecting cybersecurity.
As employees connect to servers each morning via VPN to download the valuable corporate data that they need for the day, compliance and security are easily jeopardized. As soon as the employee disconnects from the VPN, corporate oversight goes blind, and compliance can't be maintained.
There are precautions and...
Achieving Resilience in Your Distributed Workforce Environment During the COVID-19 Pandemic and Beyond.
The COVID-19 pandemic forced organizations across the world to transition their workforce to a remote work environment overnight, disrupting processes and workflows and creating chaos in a time where clarity and...
The pivot to working from home (WFH) proved that enterprise IT organizations could do the unimaginable – and do it quickly and well. Once you realize you can move all your users to WFH in days instead of years, you start to wonder what else you can do quickly.
What digital transformation projects, long considered...
2020 was a tumultuous year for IT security and operations (IT SecOps). They were faced with seemingly unsurmountable challenges. But the most forward-looking organizations are rising to the business risk and security readiness challenges imposed by the COVID-19 pandemic.
Download this analyst report, featuring...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.