COVID-19 Resource Center: Latest News and Insights on the Novel Coronavirus and Cybersecurity Response
The COVID-19 pandemic has changed how we all live and work, creating the largest remote workforce in history. Never have topics such as identity and access management, device security and business resiliency been more critical. Use this COVID-19 Resource Center for the latest updates and opinions on the virus, its influence on the threat landscape and how global organisations can improve response.
Virtual desktop infrastructure has been around for years as an option to secure hardware and systems, but VDI often causes friction for the business and can be unpopular with users. Island Security is taking on those challenges with its Enterprise Browser by managing everything in the browser.
The geopolitical upheavals of the last few years have led to a huge uptick in cybercrime driven by nation-state threat actors. Cyber warfare has become new age terrorism, and critical infrastructure industries such as healthcare are taking the brunt of the risk, said Yevgeny Dibrov, CEO at Armis.
Everyone has their favorite threat intelligence feeds, and information sharing is a must between public and private sectors. But don't overlook the power of cyber human intelligence, says Michael DeBolt of Intel 471. In fact, HUMINT is an imperative, not an option, he says.
When you create proprietary code, even using a component of open-source code within a subcomponent could cause your project to become open-source code.Jeanette Sherman of Mend Security discusses the need to identify open-source code and the license types being used.
Post-digital transformation, in a world of hybrid work and multi-cloud environments, government agencies in particular sometimes struggle to detect and respond to threats across the expanded attack surface. Peter Romness of Cisco talks about new strategies to defend these broad environments.
A suspected Pakistan espionage threat actor that relies on phishing emails is expanding to the education sector after years of focusing on the Indian military and government. Security researchers from SentinelLabs say Transparent Tribe is using malicious documents laced with Crimson RAT malware.
Companies have rapidly adopted digital strategies to fuel growth and profitability, yet many of these changes have inadvertently accelerated the risk of cyberattacks. As evidenced by the recently released 2023 OpenText Cybersecurity Threat Report, cybercriminals are taking advantage of these gaps.
Everyone has their favorite threat intelligence feeds, and information sharing is a must between public and private sectors. But don't overlook the power of cyber human intelligence, says Michael DeBolt of Intel 471. In fact, HUMINT is an imperative, not an option, he says.
Network boundaries have dissipated while changes in regulation and customer approaches to trust now require more advanced authentication and the ability to treat each authentication in relation to its specific risk level. Broadcom's Mary Ann Furno discusses these issues.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing covid19.inforisktoday.com, you agree to our use of cookies.