Enterprises globally are suddenly
challenged to support and secure the
largest remote workforce in history.
Michael Goldgof of Barracuda shares
insight on how to scale up this capacity
securely, maximizing existing tools.
Download this eBook to learn more about:
Unique challenges articulated by customers;
How...
Ransomware, phishing, extortion scams - they all are
using COVID-19 themes. But socially engineered attacks
were already on the rise before the pandemic, say Olesia
Klevchuk and Nishant Taneja of Barracuda, who share
insights on the evolution of cloud-based email defences.
Download this eBook to learn more...
A recently uncovered phishing campaign is spoofing notifications from Microsoft's Teams collaboration platform in order to harvest Office 365 credentials from employees working from home offices because of the COVID-19 pandemic, according to research from Abnormal Security.
The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.
The number of brute-force attacks targeting RDP connections has spiked since the COVID-19 pandemic forced employees all over the world to work at home, according to an analysis from security firm. These types of attacks can lead to malware infections, cyber espionage and other threats.
Security teams are facing a worst-case scenario - juggling identity and access management while detecting threats for an infrastructure that is no longer within the safe confines of their castle walls.
The fastest to react to this tectonic shift have been the hackers. How are they planning their attacks? What can...
Four CISOs, two CEOs, one global crisis. These are the ingredients for an exclusive panel discussion on how enterprises have emerged from the cybersecurity challenges of COVID-19 and how they are building the foundation for an entirely new way to live and work post-pandemic.
Somewhat lost in the COVID-19 pandemic and remote workforce issues: 5G technology deployment. Olivera Zatezalo, CSO of Huawei Technologies Canada, discusses cybersecurity and privacy challenges - and Huawei's role in addressing them.
What is the workforce going to look like after this global emergency? Security organizations, healthcare, education, public services, finance, transport and other businesses struggle to respond to critical urgency simply equipping their new remote workforces to keep up.
Tomorrow, the world will not step back into a...
The new normal for many office workers is working from home (WFH), and they are finding many new challenges and dangers which comes with this. This is because 90+% cyber security attacks begin with email, and users are more at risk than ever of attack due to not having an IT department nearby or have the correct...
The global pandemic has revealed a lot about the extended remote workforce and its haves and have-nots, says Mike Kiser of SailPoint Technologies. In a preview of an upcoming virtual roundtable, he describes the cybersecurity forces shaping the new post-crisis workforce.
Cybercriminals are using spoofed messages and images from Zoom and Cisco WebEx as lures in new phishing campaigns that are designed to steal credentials or distribute malware, according to the security firm Proofpoint.
Companies are often reluctant to begin their Zero Trust journey because they believe it is difficult, costly, and disruptive but building Zero Trust networks is actually much simpler than building legacy 20th-century hierarchical networks. There is a five-step methodology that, when followed, supports the ease of...
In the age of COVID-19 - when staying as close to home as possible and trying to avoid touching anything in public that might spread coronavirus is the new normal - cash is out, and "contactless" payments are in, if you're lucky enough to be able to use them.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.