Mason Swenson, vice president of product management, CrashPlan
Endpoint detection and response is a great defense - but not entirely enough to protect all data in the event of a devastating cyberattack. Enter endpoint backups, which provide extra levels of resiliency, recovery and compliance, says Mason Swenson of...
As the economy shifts and budgets tighten, it’s more important than ever to showcase the value of the security tools you use to protect your organization.
Learn how investing in Abnormal Security can yield a 278% ROI within three years and help your organization avoid $4 million in losses from business email...
Visibility means more than just tools that provide insight into one part of your environment. In this use case, hear how the Ulta team found a way to detect, investigate, and respond to threats and performance degradations across their entire network, from on-premises data centers to store locations, and increasingly...
At the vanguard of pediatric medical research, Seattle Children's Hospital's work in cancer therapies, genetics, neuroscience, immunology, and infectious diseases is recognized internationally. As a premier health and research organization, Seattle Children's must maintain a strong security posture without stifling...
To address today’s dynamic and expanding attack surface, organizations are increasing their testing cadence and selecting testing level due diligence based on the criticality of assets under review. What else can we learn from four years and 3,100 pen tests across almost 1,600 clients plus analysis of more than...
Digital identities a – particularly the TLS certificates throughout your organization – are used by
machines to authenticate machine-to-machine communications. But they also protect machines
through consistent, trusted encryption.
When these machine identities fail, organizations experience outages. Even...
Fastmail's customers utilize its platform specifically to get away from Google's user tracking and privacy invasion practices.
To meet the needs and expectations of its customers, Fastmail wanted to implement a privacy-centric bot management solution to effectively safeguard new account creations, recoveries, and...
With its acquisition of Infiot, Netskope now carries both the networking and security technology needed to build a Secure Access Service Edge architecture following. The acquisition of Infiot's platform will allow Netskope customers to address both traditional and emerging SD-WAN use cases.
While reports of big health data compromises involving unencrypted computers have been sinking for years, the recent theft of an iPad from a locked storage room - along with the tablet's password - is a reminder that mobile device mishaps can lead to breaches affecting tens of thousands of patients.
Exploring new ways to offer security as a service from his organization to external customers is an exciting challenge and opportunity, says Sean Mack, CIO and CISO of publishing company Wiley. He also discusses aligning security investments with the company's biggest business risks and goals.
Welcome to ISMG's compendium of RSA Conference 2022. The 31st annual conference covered a wide range of topics including cybercrime, cyberwarfare, zero trust, supply chain risk, ransomware, OT security, cyber insurance and jobs. Access 150+ interviews with the top speakers and influencers.
Police in Nigeria this week arrested a 37-year-old man who's been charged with masterminding "a criminal syndicate tied to massive business email compromise and phishing campaigns," Interpol says. But with known BEC losses last year exceeding $2.4 billion, will the arrest have a noticeable impact?
Hundreds of thousands of Konica Minolta printers used in businesses have reportedly been vulnerable to three critical flaws since 2019. Although a patch was available, deployment was delayed as the firmware update required physical access to the printers and COVID-19 made that difficult.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing covid19.inforisktoday.com, you agree to our use of cookies.