HackDig : Dig high-quality web security articles for hackers

UEM tackles remote work: ‘2020 Gartner Magic Quadrant for Unified Endpoint Management Tools’

As summer winds down, unified endpoint management (UEM) is starting to heat up. Gartner just introduced the 2020 Gartner Magic Quadrant for Unified Endpoint Management, the newest (and third) edition of its annual research report. Per our understanding, the 2019 edition focused on, among other things, the evolution of mobile device management (MDM) and ente
Publish At:2020-08-17 10:55 | Read:305 | Comments:0 | Tags:Endpoint Mobile Security remote workforce Gartner Magic Quad

Vendor Management: 7 Tips for Security During Remote Work

Third-party vendor management can be a risk to an organization’s data and network security. Enterprises depend on vendors to use security best practices that meet company standards while using their services when they have access to the company network. But that was when most people were working from their company’s physical place of business an
Publish At:2020-08-10 09:10 | Read:228 | Comments:0 | Tags:Data Protection Risk Management remote workforce Third-Party

Endpoint Security Using AI & MITRE For Your Remote Workforce

As employees increasingly work remotely, it is more important than ever to maintain visibility and threat detection in a remote working world. We have seen a significant increase in state-sponsored attacks and malicious phishing campaigns, and this trend is expected to continue. This period of remote work is a good time for enterprise to make sure endpoint
Publish At:2020-08-06 09:54 | Read:223 | Comments:0 | Tags:Endpoint remote workforce Endpoint Security Remote Access Th

What’s New in the 2020 Cost of a Data Breach Report

In a world of uncertainty and change, it’s a comfort that some things are consistent year after year. Now in its 15th year, the annual Cost of a Data Breach Report, with research by the Ponemon Institute and published by IBM Security, continues to provide a detailed view of the financial impacts security incidents can have on organizations, with histo
Publish At:2020-07-29 08:52 | Read:263 | Comments:0 | Tags:Data Protection Threat Intelligence Threat Research Cost of

It’s Time to Take a Fresh Look at Zero Trust

With millions of employees across the U.S. experimenting with work-at-home scenarios for the first time, many organizations are taking a fresh look at a Zero Trust security strategy. A convergence of trends and technologies, combined with a new awareness of the risks of relying solely on perimeter defenses for protection, may make this the right time for Zer
Publish At:2020-06-03 09:20 | Read:383 | Comments:0 | Tags:Identity & Access Chief Information Security Officer (CISO)

Video Conferencing Security for Businesses Isn’t a New Issue, It Just Came Into Focus

With 316 million Americans being asked to stay at home during the COVID-19 pandemic and nearly half of the U.S. population still working from home, video conferencing has suddenly become a critical tool for businesses. In fact, tools for remote work have spiked 84 percent since February, with video conferencing platforms like Webex recently sharing that they
Publish At:2020-06-01 07:09 | Read:453 | Comments:0 | Tags:Threat Research remote workforce Access Management Authentic

Advocating Security Fundamentals During and After COVID-19

The COVID-19 health crisis almost instantly changed how the world works, bringing with it new security threats and challenges. As organizations work to find the path forward and emerge stronger on the other side, it’s important to take stock of where we are and where we need to be. Working Together While Apart Like many other organizations, ours transitioned
Publish At:2020-05-29 13:31 | Read:437 | Comments:0 | Tags:CISO Cloud Security remote workforce Zero Trust Cyber Resili

Tools

Tag Cloud