Fast and Secure Connectivity from Anywhere, Designed for Financial Institutions

Provide Users Fast and Secure Connectivity from Anywhere with the Leading SASE Platform Based on Containerization for Complete Data Isolation With increasing bandwidth, encrypted traffic, shifts to cloud applications like […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Fast and Secure Connectivity from Anywhere, Designed for Financial Institutions

COVID Impact on MSSPs

By Tristan Hinsley, Cybersecurity Expert, TDI Security Given the remote nature of most Managed Security Service Providers’ (MSSPs) business operations, most would imagine they would be well-positioned to deal with […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on COVID Impact on MSSPs

Weaknesses of Biometric Authentication

By Mark Perkins, MS, CISSP, IT Manager In today’s digital world, knowing who is on the other end of the wire is more important than ever.  The democratization of digital […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Weaknesses of Biometric Authentication

Getting Employees Back to the New Normal

Work will never be quite the same once the pandemic has passed By Brendan O’Connor, CEO, and Co-founder, AppOmni There are encouraging signs that the Covid-19 pandemic – arguably the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Getting Employees Back to the New Normal

Network Security Is Not Data Security

Data is an organization’s most valuable asset, yet data loss is one of the biggest repercussions of a cyber-attack. By Matt Cable, VP Solutions Architects & MD Europe, Certes Networks […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Network Security Is Not Data Security

CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks

New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks

Post COVID-19: Password Extinction Accelerated; Telemedicine Spurs Fraud

By Robert Prigge, CEO of Jumio Passwords will become extinct much faster than predicted. As the COVID-19 pandemic pushed more of us to self-isolate, Zoom became the go-to teleconferencing platform. […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Post COVID-19: Password Extinction Accelerated; Telemedicine Spurs Fraud

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X