Learn how to ensure zero trust access to private applications in datacenters, Azure and multi-cloud environments. Leverage your Azure AD user store for Single Sign On (SSO) into any private resource, beyond just SAML-based web SSO.
When it comes to keeping your private apps private, on-prem VPNs lack the agility...
The era of pandemic-induced telework is also the era of higher reliance on mobile devices for sensitive workplace information - meaning we're likewise living in the age of fretful chief information security officers, a new survey concludes. "Companies are still struggling" to secure mobile devices.
This year's winner of RSA Conference's prestigious Innovation Sandbox Contest has completed its first major funding round, earning backing from CrowdStrike CEO George Kurtz. Talon has received $100 million to support more operating systems, add more capabilities and boost existing integrations.
Remote workers depend on anywhere access to your business apps and resources, but a VPN cannot protect you from social attacks and other new threats. You need a Zero Trust Network Access (ZTNA) solution that can both protect your distributed workforce and ensure a quality user experience.
Download this report with...
While reports of big health data compromises involving unencrypted computers have been sinking for years, the recent theft of an iPad from a locked storage room - along with the tablet's password - is a reminder that mobile device mishaps can lead to breaches affecting tens of thousands of patients.
The cloud. SaaS. Mobile workforces. An unstoppable wave of BYOD. Today, users and the applications they depend on are more widely distributed than ever. Networks are exposed and threats continue to evolve. But “lock it down” no longer works. IT Security teams need to achieve the same visibility and control they...
Ransomware-as-a-service, supply chain attacks and the Russia/Ukraine war - they all are factors behind the growing need for digital executive protection outside the traditional workplace. Chris Pierson of BlackCloak shares new research and insights.
Mosyle closed a $196 million funding round to expand beyond mobile device management and provide a holistic security platform for Apple devices. The company wants to boost adoption of Mosyle Fuse, which combines MDM, endpoint security, encrypted DNS, identity management and app management.
Organizations need to protect their most valuable asset: data. And while cloud and BYOD adoption has provided users anywhere access to corporate data, it has opened up the available entry points for bad actors looking to maximize their return.
Today, nearly 8% of all data breaches involve ransomware, with an...
Data breaches have increased for 75% of organizations due to the onslaught of remote work unleashed by the global pandemic. Suffering a breach has implications for regulatory compliance, brand reputation, data subject safety, and enterprise success overall. In other words, the end is nigh for many companies and their...
In ransomware attacks, cybercriminals attack through the backups because they know that security practitioners rely on backups to save themselves after a ransomware attack. Therefore, it is essential to have multiple backups, says Tom Kellermann, head of cybersecurity strategy at VMware.
The UK's NCSC has published an updated guidance for employees using their personal devices for work. The agency offers technical controls for different types of bring-your-own-device, or BYOD, deployments. And a Bitdefender report stresses the need for good cyber hygiene when using BYOD.
A compromise of sensitive health information affecting nearly 38,000 individuals discovered nearly a year after a terminated company executive accessed the data spotlights some of the top security and privacy challenges covered entities and business associates face with insiders.
They are high-profile, they have access to your
company’s most vital information, they rely on
unsecured personal devices – and your cyber
adversaries are targeting them. They are your
board members, and Chris Pierson of BlackCloak
has ideas on where and how you can better secure
Healthcare went through five years of transformation over the course of 2020. How does this new telehealth focus most change how healthcare security leaders must view cybersecurity?
In an eBook with Information Security Media Group, Hank Schless of Lookout discusses: