CERT Warns Bad Actors Are Targeting Remote Access – How Security Operations Find And Route These “Below The Radar” Attacks
New Ransomware/Exfiltration Campaign Targeting Remote Access Resists Resolution Through Data Restoration By Saryu Nayyar, CEO, Gurucul Remote access tools, such as VPN’s, RDP, VNC, Citrix, and others, have always been…
Everything You Want to Know About Single Sign-On
By Ayman Totounji, Founder , Cynexlink Wikipedia defines Single sign-on or SSO as “an authentication scheme that allows a user to log in with a single ID and password to any of…
How To Fight A Virus: Lessons From Cybersecurity
By Yotam Gutman, SentinelOne There has been a great deal of conversation around the similarities between the spread of the Covid-19 virus and that of computer viruses. And indeed, as…
Managing Small Business Cybersecurity During Covid-19
By Bill DeLisi, CEO of GOFBA Small businesses are undertaking extraordinary changes during the coronavirus epidemic. They’re laying off staff, shifting their business models, and managing the challenges of remote…
7 Security Precautions to Protect Remote Workers
By Marty Puranik, President & CEO, Atlantic.Net The COVID-19 pandemic has engulfed the world’s population, crippled global economies, and changed the way of life for almost every single person in…
3 Practices to Avoid Security Risk in A Work from Home World
By Akshay Bhargava, Chief Product Officer, Malwarebytes Well before COVID-19 hastened people working from home, users embraced “bring your own device” (BYOD) practices. It created a proliferation of work-connected personal…
Digital Healthcare: How Secure Is the Care Data?
By Prerna Lal, Assistant Professor, International Management Institute New Delhi, India Abstract Digital revolution has changed the way organizations work; the healthcare industry is no exception. Technologies like cloud computing,…
The Devil Inside
Insider Threats on the rise By Mary Roark, VP of Marketing, Cyberhaven With growing economic uncertainty all indicators point to a sharp increase in insider threats across all industries. There…
COVID-19: How to Take Advantage of Teleworking
By Pedro Tavares, Editor-in-Chief seguranca-informatica.pt With the COVID-19 outbreak, companies and governments are taking preventive measures that include teleworking. This can be a turning point in the way we look…
Top 5 Coronavirus Scams
By Zack Schuler, founder and CEO of NINJIO One of the reasons NINJIO content is so successful at capturing and holding employees’ attention is its relevance – we release new…
What the Latest Enterprise Endpoint Security Survey Shows Us: Big Concerns but Hope for The Future
By Jeff Harrell, Vice President of Marketing, Adaptiva More bad news when it comes to IT security. The fourth annual Enterprise Endpoint Security Survey was recently released, showing that just…