Enterprises can strive to implement the zero trust service to secure every user, every device, and every connection at all times. Read on to know how to protect your most…
work from home
-
-
With the expeditious growth and swiftness of digital business, InfoSec leaders are increasingly recognizing the value of Identity and Access Management (IAM) on cybersecurity technology. Subsequently, there has been a…
-
The Voice of the CISO Report for 2021 was recently published by Proofpoint. After a year of pandemic lockdowns, this first white paper examines the core issues facing Chief Information…
-
As the COVID-19 pandemic spread across the world, McAfee, saw a 605 percent rise in Q2 2020. In Q3 and Q4, the number of cyberattacks increased by 240 percent and…
-
The Zoom security vulnerability is very serious, and two Computest cyber security researchers discovered it at the Zero Day Initiative’s Pwn2Own bug bounty contest. Zoom has had its fair share…
-
According to a new study, cyberattacks against remote access protocols have continued to grow over the past year as Work From Home has become more commonplace due to the pandemic.…
-
Since millions of people have been forced to work from home due to pandemic-related lockdowns, cybercriminals have taken advantage of the situation to launch a wave of RDP attacks. When…
-
Source: Reuters Cyber security company Avast said demand for its products surged in the second quarter of 2020 as people shifted to working from home in the pandemic, helping it…