Fifty-three percent of survey respondents say cyberthreats became fiercer during COVID-19, and 17% say the pandemic disrupted their data security initiatives. These are among findings of a new survey sponsored by HelpSystems. Cary Hudgins analyzes the results and discusses how to put them to work.
Pete Barker was a cybersecurity Digital Loss Prevention practitioner before joining SpyCloud as Director of Fraud & Identity. He saw first-hand the impact of COVID-19 on fraud incidents, which are more automated and broadly targeted. He explains how "COVID changed all the rules" and how defenders can raise their game.
80% of companies will allow employees to work from home or the office. We call this “hybrid work.” This has created a need for secure access services that work consistently across locations so users can work from anywhere, can scale easily without complexity, and can minimize risk of cyber threats like ransomware...
Over 500 cyber security professionals reveal key incident response challenges and how they’re rethinking preparedness, detection and response programs.
Download this whitepaper - takeaways include:
Over 55% of organizations want to improve time to containment and incident response automation but more than 45%...
In 2020, reports indicated that cyberattacks on the healthcare industry more than doubled from 2019, with
ransomware accounting for 28 percent of all attacks. Unlike previous attacks focused
primarily on providers, the COVID-19 pandemic
exposed vulnerabilities in the entire healthcare sector.
Attackers, especially...
The Cybersecurity and Infrastructure Security Agency (CISA) has issued multiple alerts over concerns that the rush to use Microsoft 365 and other cloud productivity platforms as a result of the COVID-19 pandemic may expose organizations to undue risk.
Download this checklist and evaluate your organization’s...
2020 was a culmination of market shifts that has become a catalyst for the adoption of Identity Governance and Administration (IGA)—from work from home to the implementation of a zero-trust strategy.
In a new survey from Omada and Enterprise Strategy Group, 93% of your peers agree that the COVID-19 outbreak has...
With the explosion of remote business, we are now digitizing many of our documents and processes. Entrust’s Jay Schiavo explains what new mindset this shift requires, what’s needed to ensure document authenticity and integrity.
COVID-19 didn’t spark digital transformation – it accelerated it. And as a result, what used to be cybersecurity’s IAM exceptions are now the rule. It’s a new reality and a new opportunity for the zero trust model, says Dr. Amit Sinha of Zscaler.
The "remote workforce" of 2020 is gone. Now we're talking about the new, permanent "branch office" - and it comes with its own unique set of cybersecurity concerns, says Derek Manky of FortiGuard Labs. He discusses new social engineering trends and how to respond.
The pandemic only amped up the need for better bandwidth, visibility and centralized management, and all within a budget that will make it possible. Prior to COVID-19, Kumar Ramachandran of Palo Alto Networks declared 2020 the “year of the early majority” for SD-WAN adoption.
Ramachandran, former CEO of...
This webinar with Osterman Research offers insights into critical issues network managers need to address to gain visibility and secure their network traffic.
The distributed workforce, combined with the need to modernize and improve operational efficiency, has reframed digital transformation priorities and introduced new areas of risk to today's enterprise. In light of ongoing macroeconomic demands, the CISO is facing increasing pressure to deliver value.
If...
Jasbir Solanki, CEO of the Homeland and Cyber Security division of Mahindra Defense System Limited, likes to call his group "The special services of cybersecurity." In this exclusive session, Solanki shares his unique perspective on what to expect in 2021, including:
Lasting impacts of COVID-19
Evolving threats...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.