A quarter of financial institutions experienced at least one spear-phishing or business email compromise attack in 2019 where user credentials were compromised and/or fraud was committed. These attacks also often resulted in intellectual property and physical damage.
Yet, nearly half of institutions surveyed state...
Identity and access management is a key foundational technology that can make or break a business' digital transformation initiatives. Identity ensures that digital interactions are secure and seamless across the enterprise, and a well-architected solution can boost workforce productivity, IT agility, and...
Already an attractive target for bad actors, APIs are predicted to soon become the top attack vector. And while APIs may hold the key to compliance with regulations like GDPR, PSD2 and CDR, they also expose potential vulnerabilities.
Read this white paper to gain a deeper understanding of:
The threats and...
59% of people mostly or always use the same password. 47% OF people say there's no difference in the passwords they use for work and home. 42% of people keep passwords in an unprotected file. These statistics point to one glaring question - are passwords alone enough to protect against the evolution of sophisticated...
The COVID-19 pandemic has led governments around the world to require citizens to stay at home for an undetermined duration, likely several months. This is incredibly disruptive to economic activity. Where possible, employers have asked their workers to continue to work, but remotely. But this transition can be taxing...
This survey is currently closed. Thank you.
Today, organizations have many different types of users (identities) accessing their data ranging from employees, non-employees, contractors, bots, and even cloud-based workloads. These same organizations run and support hundreds of applications in their environment, on a...
Federal government agencies face unique cybersecurity risks, and as a result they often place tight restrictions on mobile devices in the workplace. But perhaps it's time to loosen these restrictions because they are negatively impacting missions, recruitment and retention.
There are consequences of cutting back or...
Security professionals have long struggled to demonstrate the return on investment of their security spend.
Getting sign off for an insider threat program is no different. Advanced analytics and user and entity behavior analytics (UEBA) solutions enhance the security posture of organizations deploying them....
According to ESG research, almost two thirds (63%) of organizations say that cybersecurity analytics and operations is more difficult today than it was two years ago.
This report examines Securonix Security Operations & Analytics Platform with a focus on:
How the platform efficiently and effectively provides...
It's crucial for companies to assess and monitor the security of their vendors, suppliers and business partners.
Companies must carefully check their vendors' cyber posture, and the initial vetting of any third party typically begins with a comprehensive security questionnaire. But these can be a headache, because...
Organizations can no longer simply hire vendors without proof of a strong cyber posture, and a comprehensive questionnaire can demonstrate that vendors' internal security policies are up to par.
Yet not all questionnaires are the same. The benefits of automated questionnaires can vary, depending on the...
The cost of not complying with the California Consumer Privacy Act (CCPA) is high. This leaves companies open to the possibility of substantial financial penalties through its users. IT professionals must understand why it's important for vendors to comply with CCPA, and why those that do not can be an unacceptable...
The process of onboarding vendors has become complicated because of concerns about cybersecurity. To prevent data breaches caused by a third party vendor, security professionals demand that vendors demonstrate and maintain a strong cyber posture.
Effectively checking vendors' cyber posture can be extremely...
We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. But this particular supply chain attack was an attack on a service provider.
Download this case study to learn how to quickly mitigate third-party security risks.
Delivering healthcare is a multifaceted process that requires mental and physical support for patients as well as their families. That's why digitally and physically transforming the security experience for patients and visitors is a critical part of the total patient care equation.
In spite of this, many...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing covid19.inforisktoday.com, you agree to our use of cookies.