Preceding the outbreak of COVID-19 was a trend across industries to transform the traditional IT stack into a new form of computing, one that was focused on enabling agility and innovation while also delivering cost reduction. This shift sought to leverage public cloud and cloud-like development methods as well as...
Scammers have reportedly been putting one over on customers of the famous Ritz London, which says it is "aware of a potential data breach within our food and beverage reservation system, which may have compromised some of our clients' personal data." No payment card data was exposed, it says.
Financial crime has seen some unique spikes in the past year, and banking institutions are taking extraordinary steps to coordinate their detection, prevention and response efforts - much like their fraud fusion centers.
Jeff Dant, a former U.S. Secret Service agent, now plies his skills at BMO Financial Group, where...
Data is the lifeblood of modern organizations - and modern security operations. Today's SecOps teams must be more data-driven, leveraging automation, machine learning and other tools to quickly identify threats and reduce response times, while freeing up critical engineering and analyst resources. Splunk CISO Yassir...
The U.K.'s privacy watchdog is probing banking giant Barclays over its use of employee monitoring tools after the bank in February reportedly shifted from anonymized tracking to giving managers the ability to view data for individual employees.
Will the COVID-19 pandemic lead to a spike in the number of reported data breaches? Not necessarily, says cybersecurity expert Brian Honan. But he says that the rush to adopt cloud-based services and expanded remote services might change the types of breaches being reported.
As many IT teams work overtime to enable remote workers, maintaining security practices and compliance may not be top of mind, but threat actors are actively seeking opportunities to benefit from current circumstances.
Although enabling a remote workforce is typically a common practice, some particularly urgent and...
The latest edition of the ISMG Security Report analyzes the surge in the use of employee monitoring tools for the increasingly remote workforce. Also featured: Discussions about IoT security guidelines and CCPA compliance requirements.
With so many employees working from home during the COVID-19 pandemic, vendors of time-tracking and productivity-monitoring software report surging interest in their wares. Regardless of whether organizations deploy light-touch or more Big Brother types of approaches, beware potential privacy repercussions.
New research shows why planning for a long-term remote workforce is critical and which approaches to turn to during COVID-19 and beyond.
For those tasked with protecting network security, the work-from-home model creates unprecedented challenges at a time when teams are already doing more with less while facing a...
Managing risk complexities posed by multiple third-party vendors will always be a challenge. CISOs, security and compliance professionals are making third-party risk management a priority like never before due to remote working, supply chain complexity, cloud storage, phishing and ransomware attacks, and regulations...
Organizations have undergone rapid network transformation in the last two months, and though the change has now stabilized into a new normal, new security concerns that affect an organization's overall risk often have not been addressed. Now that the dust has settled, many leaders are examining the transformation and...
How organizations in the most demanding and complex environments are leveraging Tanium to build resilience, maintain business continuity, and manage their long-term risk for today, tomorrow, and the new normal.
This paper discusses:
Endpoint Management and Security in the Age of COVID-19
Why Internal Endpoint...
The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.
As many IT teams work overtime to enable remote workers, maintaining security practices and compliance may not be top of mind, but threat actors are actively seeking opportunities to benefit from current circumstances.
Download this whitepaper to learn ways to reduce your attack surface, including:
Enforcing least...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing gdpr.inforisktoday.com, you agree to our use of cookies.