The rapid transition to remote work since March 2020 has created a new normal for organizations, which now confront decisions on when to return to the physical office, if at all, and in what capacity.
Security teams must update their security incident reporting policies and processes to account for remote work or risk exposure to increased threats. The ability for employees to work remotely comes ...
Attackers target remote desktop software platforms for the same reason that makes these platforms useful for distance learning: They grant almost total access to a target computer from anywhere in the ...
The idea of zero trust in the enterprise has shifted in recent years from mostly theoretical to actual implementation. It makes sense, after all, as security teams improve and fortify the security ...
Kris Lahiri is Co-Founder and Chief Security Officer at Egnyte, responsible for the company's security, compliance and core infrastructure. A study published earlier this year found that almost ...
There’s a clear gap between expectation and reality when it comes to security controls. Despite deploying best-in-class security tools and building capable teams, many organizations discover the truth ...
The exploding demand for remote access into today's industrial control systems (ICS) and operational technology (OT) systems has created a nebulous, Internet-connected attack surface that's too ...
Steve Durbin is Chief Executive of Information Security Forum. He is a frequent speaker on the Board’s role in cybersecurity and technology. The fourth industrial revolution is here, and new ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results