Centrify released new research that found nearly half of IT decision makers' companies had to accelerate their cloud migration plans (48%) and IT modernization overall (49%) during the COVID-19 pandemic.
How are threat actors so successful? They gather breached data and information from open sources – think social media profiles or even voting records – to build digital profiles of individuals with just a few clicks. This can then lead to, among other attacks, phishing scams such as business email compromise, potentially inflicting a significant financial toll on an organization.
Much like the long-standing debate around 5G, President Trump’s recent decision to sign an executive order that may see TikTok and WeChat banned, and has now evolved into a bidding war for TikTok’s U.S. operations with Oracle leading as the potential winner, has brought the world’s attention to the inherent security challenges that complex global digital communications and connectivity present.
To better regulate the use of personal data and protect citizens, the European Union adopted the General Data Protection Regulation (GDPR), which came into force on 25 May 2018. In the UK, the GDPR is tailored by the Data Protection Act 2018. Non-EU businesses with offices in Europe, or who hold or process data coming from Europe, also need to be fully appraised of GDPR.
The digital revolution has made it easier for companies to collect insights on their markets to better understand their clientele's behavior. But it has also paved the way for potential abuses, creating a climate of suspicion. How can AI earn the public’s trust?
Here, we talk to Julian Waits, General Manager of Cybersecurity at Business Unit at Devo, to find out how security operations center (SOC) leaders can create a culture of growth among their teams.
One thing has become clear; to abide by the “new normal” restrictions, organizations need to be constantly aware of their environments’ compliance, in real-time. To do that, they need to improve their security and situational awareness, so they can quickly assess evolving situations and respond when violations occur.
A security researcher published a blog outlining the details of common misconfigurations in Salesforce that can result in guest users, or hackers leveraging guest user access, gaining access to sensitive data in Salesforce.
Security professionals can incorporate a few simple items to make the remote experience safer, more secure and more productive. Here’s the “shopping list” that should be on every CSO's desk right now and translates across higher education institutions, corporations and more.
Protecting Argentina’s 9,300-kilometer border with Chile, Bolivia, Paraguay, Brazil and Uruguay requires significant attention from the Gendarmería Nacional Argentina (GNA), the country's 70,000-person border guard force located in the capital city of Buenos Aires. The GNA, as well as their border force colleagues in neighboring countries, must also grapple with cross-border crime that take advantage of the close ties among the region’s economies. According to Interpol, illicit markets in these border regions may be worth tens of billions of dollars.
A new reports aims to understand the maturity and effectiveness of web application security in organizations worldwide. For example, 75% of executives believe their organization scans all web applications for security vulnerabilities, while nearly 50% of security staff say they don’t.