A month-plus into pandemic response, what have enterprises learned from deploying and securing a nearly fully-remote workforce? Thomas Bieser of Okta shares lessons and the benefits of accessing critical apps and tools via the cloud.
In this webinar, Mark Sangster discusses how the COVID-19 crisis is affecting businesses and individuals and the need to stay vigilant. Emerging threats from bad actors who are taking advantage of the COVID-19 crisis are inevitable. Distributed workforces are leaving gaps in our defenses and opening the door to...
Travelex, a London-based foreign currency exchange that does business in 26 countries, including the U.S., paid a ransomware gang $2.3 million to regain access to its data following an attack, the Wall Street Journal reports. The incident crippled the company's customer services for weeks.
Organisations today represent a complex and continually evolving tapestry of components. Each component adds complexity to business and magnifies its fragility - especially when something goes wrong. If your organisation is pursuing digital transformation, there's a very good chance that something will go wrong,...
Today, organisations face a litany of disruptive threats in the modern business world. Managing Business Resiliency (BR) requires more than business continuity planning, but rather a mixture of building resilient business processes, IT systems and controls, and employing skilled, informed people to ensure the business...
Business continuity (BC) and IT disaster recovery (DR) plans go a long way toward ensuring that critical business and IT functions continue to operate or can be recovered to an operational state within an acceptable amount of time if a crisis occurs. However, managing the myriad of plans for all these complex...
Digital transformation is creating increasingly complex ecosystems for companies that use third parties to augment their own digital and business capabilities. Because of the increasingly digital nature of third-party ecosystems, security and risk management leaders and teams must work together to manage third-party...
Just say goodbye to the remote access VPN.
Applications are now running in cloud and users are accessing them from everywhere. This means that organizations no longer control the network, making it impossible to do network security, and disrupting 25 years of remote access technology.
Transformation has created...
As the COVID-19 outbreak has intensified, so too has cybercrime, including ransomware, Interpol, the international crime-fighting agency, warns. Despite some gangs claiming to no longer be targeting healthcare organizations, experts have seen "no abatement, empathy or free decryptor" from any of them.
At a time when cybersecurity leaders are managing
business resiliency with the world's largest remote
workforce, how can enterprises remain both dynamic
and grounded in fundamental security controls?
Christopher Kloes, vice president of security at Unisys,
discusses this challenge.
Download this eBook to learn...
As April begins, enterprises are starting to re-evaluate their COVID-19 response plans, says crisis management expert Regina Phelps. What are the other pandemic response planning phases we can expect to see as infections spread and quarantines continue?
What missteps led to hackers stealing details on 145 million Americans from Equifax in 2017? The answer to that question can be found in numerous reports and a Justice Department indictment. Security researcher Adrian Sanabria says they're essential reading for anyone responsible for cybersecurity defenses.
The latest edition of the ISMG Security Report offers an analysis of the phases businesses will go through in the recovery from the COVID-19 pandemic, plus an assessment of new risks resulting from the work-at-home shift and lessons learned from the Equifax breach.
The Global Cyber Alliance is one of 13 nonprofit organizations that have banded together to offer businesses security tips for their newly remote workforces. Andy Bates, executive director of the alliance, discusses the coalition's core guidelines for reducing cyber risk.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.