To ensure business continuity, companies that support India's critical infrastructure need to validate the functioning of the security controls and other tools deployed to support the remote workforce during the COVID-19 pandemic, says Mumbai-based Shivkumar Pandey, group CISO at the Bombay Stock Exchange.
The cybersecurity outlook for 2020 and the new decade will be characterized by more advanced, targeted and coordinated attack vectors designed to exploit the cybersecurity skills shortage, along with congenitally poor security fundamentals and hygiene.
Guarding against threats targeting end users is among the top security priorities this year at a large group of surgical centers in Washington state - and artificial intelligence could play an important role, says CIO Curt Kwak of Proliance Surgeons.
The chief security officer for the U.S. Democratic Party is recommending that all party officials avoid using mobile devices made by Chinese manufacturers ZTE and Huawei. Bob Lord says that even if devices from those manufacturers are free or low cost, no one wants to be the next "patient zero."
The typical SMB employee uses a myriad of endpoint devices - desktop computers, laptops, smartphones, tablets - all equipped with various applications. As a result, SMBs become more open to risks of company intrusions.
Download this whitepaper and learn how to solve BYOD challenges such as:
A compromised employee...
There's no denying that the proliferation of mobile devices presents new safety challenges for enterprises and consumers alike. But these potential challenges can be mitigated, paving the way for mobile to become a trusted, convenient and multipurpose enterprise digital ID.
Learn why mobile is the future of...
If you're thinking, "Mobile threats and malware are still in their infancy and the risk isn't significant enough yet," it's time to think again. The rise of advanced, PC-grade mobile malware, innovative fraud schemes, such as SIM swap fraud, and fraudsters' increasing use of mobile devices in cross-channel attacks...
As more and more sensitive data passes through and resides on mobile endpoints, unique security challenges are created for enterprises.
To ensure your organisation is secure, what are the top threats that you must prepare to face?
Download this checklist of the top ten mobile threats, and learn how you can...
High-profile, targeted attacks from malicious actors now occur with frightening and increasing regularity. This evolution of advanced threats overwhelms both IT organizational bandwidth and the capabilities of legacy antivirus tactics, particularly as the increasing number of endpoint devices used by employees expands...
A new cyberattack trend report from Europol notes that while online criminals continue to refine their capabilities, old and unsophisticated attacks too often still succeed, thanks to poor digital hygiene and a lack of security by design and user awareness.
Four years after the FFIEC issued its updated authentication guidance, many banking institutions say account takeover losses have gone up, a new survey shows. John LaCour of PhishLabs explains why institutions' reactive approach to fraud is failing.
Cisco announced plans to pay $635 million to purchase cloud security firm OpenDNS to better secure the "Internet of Everything." OpenDNS says the acquisition will leave its products and personnel intact.
It's been two years since the FFIEC issued updated guidance for online-banking transactions. But how effective have banks' conformance strategies actually been at curbing fraud? Experts weigh in.
Spear-phishing attacks are up and targeting individuals across all industries, according to a new warning from the FBI. Security experts advise how organizations can better detect and prevent attacks.
Attacks aimed at mobile devices are progressing much more rapidly than any attacks ever waged against PCs. Organizations are in danger if they don't pay attention, says anti-phishing expert Dave Jevans.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.