Cyber Defense Magazine – July 2019
Everybody makes mistakes when it comes to phishing, even executives. Ensuring all employees realize they can be scammed and that ...
Ensuring the Security & Productivity of an Increasingly Remote Workforce By Morey Haber, CTO & CISO, BeyondTrust Driven ...
Remote Security Access In most cases, remote employees connect to corporate resources directly via a VPN or via hosted cloud res ...
Cybersecurity Hygiene Finally, there is the challenge of deploying basic cybersecurity controls like vulnerability management an ...
About the Author With more than 20 years of IT industry experience and author of Privileged Attack Vectors and Asset Attack Vect ...
Enterprise Social Collaboration: Security Friend or Foe? By Dr. Steve Marsh, Vice President of Product for Nucleus Cyber Enterpr ...
to contain confidential information, 165% more likely to contain identification numbers and 6% more likely to contain passwords. ...
chat, voice, video and files together in one tool, sensitive data is no longer contained in files alone: it exists, literally, e ...
Data and users are almost constantly in motion. Silos of data and users are numerous and almost constantly changing. The silos ...
About the Author Steve Marsh is the Vice President of Product at Nucleus Cyber and brings more than 20 years of product experien ...
2019: Why Invest in Secure File Transfer This Year Are You in the Business of Securing Your Data? Keeping your data secure may s ...
Cybersecurity Ventures, damage related to cybercrime is predicted to cost in excess of $6 trillion annually by 2021. The total c ...
unnecessary to spend valuable hours translating one file format to another or troubleshooting when a file format fails. All of t ...
Criminals Obtain 2.8 Billion Consumer Records In By Robert Vamosi, CISSP and senior product marketing manager, ForgeRock Cybercr ...
In terms of industry, healthcare remains the most attacked, suffering in 2018 from more than four times the number of breaches t ...
About the Author Robert is a CISSP and senior product marketing manager at ForgeRock. He is the author of When Gadgets Betray Us ...
Broader, More Disruptive, More Critical: Cyber Threats Morphing as 5G, Machine Learning, and IoT Emerge By Steve Durbin We’re al ...
Critical national infrastructure (CNI), IoT manufacturers, businesses and citizens will all be heavily or totally dependent on 5 ...
Unprepared organizations will have a wide (and often unmonitored) attack surface that can be targeted by parasitic malware. They ...
Securing the Remote Patient Monitoring Ecosystem By George W. Jackson, Jr. Senior Principal Consultant at Clearwater Compliance ...
«
1
2
3
4
5
6
7
8
9
»
Free download pdf