Some experts predict cyber insurance rates will increase 40-75% in the near future, and MSPs need to take action now to protect their profits and businesses in 2022 and beyond. The panelists will explore why ransomware attacks are at the heart of these increases. This webinar features expert insights from:
Fortinet has raised prices on products and services to address macroeconomic challenges including shipping delays, longer activation timelines and the suspension of sales in Russia. The company says price hikes have more than offset supply chain and geopolitical headwinds in recent months.
John Kindervag, creator of zero trust and senior vice president at ON2IT, and Grant Schneider, senior director at Venable, join ISMG editors to discuss the latest Log 4j findings, threats posed by a Chinese-made automotive GPS tracker and the challenges of a distributed workforce.
Whether your organization is already working remotely, or you’ve suddenly made the shift, if you are using traditional VPN, you’ve employed a service that is exposing your organization to network-level security risks.
This white paper talks about a seamless and responsive VPN-less solution whose efficiency can...
Remote workers depend on anywhere access to your business apps and resources, but a VPN cannot protect you from social attacks and other new threats. You need a Zero Trust Network Access (ZTNA) solution that can both protect your distributed workforce and ensure a quality user experience.
Download this report with...
With its acquisition of Infiot, Netskope now carries both the networking and security technology needed to build a Secure Access Service Edge architecture following. The acquisition of Infiot's platform will allow Netskope customers to address both traditional and emerging SD-WAN use cases.
Organisations are facing sophisticated and well-funded adversaries with targeted penetration strategies, including supply chain attacks. Despite multi-layered security investments, these threat actors are successfully breaching defenses and going after organisations’ data. That’s why data security is your last –...
Microsoft is revealing details of an advanced spyware campaign in a bid to neutralize its effectiveness. It fingers Austrian firm DSIRF as responsible for coding malware known as "Subzero," which Microsoft researchers dub "Knotweed." Pressure is mounting on companies that supply spyware apps.
This case study presents an organization that transformed its global business operations to deliver “digital everything” for its workforce and customers.
The AVP of Security Operations said: “as we move into a ‘digital everything’ world, protecting our customers and employees is the top priority. We’re...
The chairman of the U.S. House Intelligence Committee vowed more action against makers of advance spyware such as Israel's NSO Group while witnesses pressed the panel to commit the intelligence community's resources to disrupting spyware companies.
Human and PerimeterX will join forces to prevent fraud and account abuse and address a broader range of use cases. The combination will create a bot mitigation monster with 450 employees, more than $100 million in annual recurring revenue and more than 500 customers across media and e-commerce.
While reports of big health data compromises involving unencrypted computers have been sinking for years, the recent theft of an iPad from a locked storage room - along with the tablet's password - is a reminder that mobile device mishaps can lead to breaches affecting tens of thousands of patients.
The cybersecurity of devices that use semiconductors is imperative in today's digital world, says Prathap R. This security industry veteran, who has 16 years of experience in semiconductors, discusses how IoT security has evolved over the past two decades.
Security researchers identified a rootkit active as recently as 2020 that's made to burrow deep into computers when firmware initiates the operating system. Infected motherboards examined by Kaspersky all ran on Intel's H81 chipset. The malware comes from an unknown Chinese-speaking threat actor.
Exploring new ways to offer security as a service from his organization to external customers is an exciting challenge and opportunity, says Sean Mack, CIO and CISO of publishing company Wiley. He also discusses aligning security investments with the company's biggest business risks and goals.