Calls are growing for an investigation into how commercial Pegasus spyware developed by Israel's NSO Group gets sold to autocratic governments and used to target journalists, lawyers, human rights advocates and others, with some lawmakers saying "the hacking-for-hire industry must be brought under control."
COVID-19 has exacerbated preexisting cyberthreats, from counter incident response and island hopping to lateral movement and destructive attacks. These attacks are ratcheting up existing geopolitical tensions.
Organizations, most of which depend on VPNs and other traditional network security infrastructure, may not...
8 Steps to Shore Up Your Defense Against Cyberattack
In the past, it was easy to take mainframe security for granted. The mainframe was locked down behind closed doors, and even if you were able to get into the room, you'd still needed the coding experience to hack it.
Today, the mainframe is closer to the internet...
Connected medical devices are now an integral part of modern healthcare - from pacemakers and insulin pumps to wearable monitoring devices. However, persistent and unmitigated vulnerabilities in the medical device hardware, networks and applications are putting intellectual property, personal data and patient safety...
By partnering with Ping Identity, Gates was able to bring the vision of a global authentication authority to life with advisory, configuration, deployment, and employee training.
Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar...
Explosive growth in network scale and complexity demands a next generation Public Key Infrastructure (PKI) management platform. Expansive enterprise digital certificate and PKI usage, coupled with the advent of massive Internet of Things (IoT) device introductions, requires automation for secure and scalable...
Technology, regulations and customer expectations all have evolved. What does this mean for how organizations secure identities? Baber Amin of the Office of the CTO of Ping Identity offers strategic insight.
The promise of connected vehicles is tremendous, and so are the security measures required to reach that destination without winding up in a ditch, both literally and figuratively. Highly complex systems from multiple vendors, with legacy standards, equipment, and infrastructure, all make very attractive targets for...
With advances in big data, artificial intelligence, machine learning and more, healthcare is primed to innovate. But do HIPAA, GDPR and other regulatory standards inhibit the ability to innovate? Scott Whyte of ClearDATA discusses healthcare's complex convergence of innovation and compliance.
Transport Layer Security (TLS), if implemented correctly, can ensure that no third party will tamper with a sensitive email message. The Challenge? Mandatory TLS is cumbersome, costly, and time consuming. Opportunistic TLS cannot ensure the sensitive email is actually sent securely. Read more in our e-Book about the...
Today, email is a critical component of any business and must be protected with proper security. Microsoft has become the vendor of choice for email, but many customers find the security capabilities provided do not meet their full requirements. Zix provides a broad portfolio of email security solutions that can be...
Not all email encryption solutions are created equal. Modern email encryption solutions balance security with ease-of-use eliminating barriers that would cause senders and recipients to jump through hoops.
Download this eBook to learn more about:
Consequences of difficult to use email encryption...
Email is the most used communication tool in the business and the vulnerabilities of email should not be overlooked. Implementing the right email encryption solution can be an easy way to secure sensitive corporate data, avoid breach costs and meet regulatory obligations.
Download this eBook to discover:
The...
Healthcare technology has made leaps and bounds in terms of its ability to improve patient outcomes, and yet many technologies are being deployed before security concerns can catch up.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing gdpr.inforisktoday.com, you agree to our use of cookies.