Enterprises are grappling with increased complexity as cloud adoption increases, the perimeter expands, and digital transformation projects take hold. The accelerated shift to remote working has only added to the complexity. As more businesses leverage hybrid IT environments in their digital transformation journey, many confront challenges managing identities and access across multiple applications, clouds, networks and servers.
Not long ago, most business was conducted within the confines of office walls, that is, until 2020. This year, work as we know it evolved practically overnight, as employees went home with company cell phones, laptops and information, and many have yet to return. Unlike ever before, companies must rely on their people to secure any work-related technology and trust that corporate data and information are safe. But should they? And is their current security strategy adequate? To find out, we talk to Kory Patrick, Risk & Security Solution Executive at TEKsystems.
The Information Security Forum (ISF) has announced the organization’s outlook for the top global security threats that businesses will face in 2021. Here are some of threats for the coming year.
The CERT Coordination Center (CERT/CC) has released information on 33 vulnerabilities, known as AMNESIA:33, affecting multiple embedded open-source Transmission Control Protocol/Internet Protocol (TCP/IP) stacks. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
The IoT Cybersecurity Improvement Act has been officially signed into law. The bipartisan legislation, sponsored by Reps. Robin Kelly, D-Ill., and Will Hurd, R-Texas, and Sens. Mark Warner, D-Va., and Cory Gardner, R-Colo., requires that any IoT device purchased with government money meet minimum security standards.
For years, just about every update of consumer cloud applications would include new features that the user could configure around their personal taste, convenience, and preferred uses. Over time, and with increasing features and capabilities, what had begun as an application’s simple settings, was replaced by a proliferation of tabs, cascading drop-down menus, banners, breadcrumbs, hyperlinks, bookmarks, and more, creating a world of choices and individual styles.
Silicon Valley company FireEye, who is often on the front lines of defending companies and critical infrastructure from cyberattacks, has been breached by hackers.
The boards of directors of G4S have made a recommendation to its shareholders that it accept a cash offer from Atlas UK Bidco Limited, a newly incorporated entity that is indirectly controlled by Allied Universal. Shareholders have not yet voted, however, and other offers could still be made.
As the United States continues to struggle amid the COVID-19 pandemic, many companies have been searching for creative solutions to help stop the spread of this virus. One of these solutions includes thermal temperature screening checker systems, and while these systems have been implemented in many places of business, hospitals, airports and schools across the country, there seems to be considerable misconceptions about the camera technology and its effectiveness. Here are some of the most common misconceptions.
The risk to the financial sector is extremely high, and due to the high value of financial data, cybercriminals are increasingly targeting customer banking credentials when carrying out attacks. Below, we speak to Robert O'Connor, Chief Information Security Officer (CISO) for Neocova Corporation, about the cybersecurity challenges within financial institutions and best practices to safeguard financial data and prevent attacks.