The next wave of mobile threats

According to McAfee, apps, whether for communication, productivity, or gaming, are among the biggest threats to mobile security. Technavio expects the global mobile security software market to grow by $2.75 billion between 2020 and 2025, expanding at a… Continue reading The next wave of mobile threats

WhatsApp, Slack, Teams, and other messaging platforms face constant security risks

42% of businesses report employees with BYOD devices in business settings that use tools like WhatsApp have led to new security incidents, according to SafeGuard Cyber. Messaging platforms like WhatsApp, Telegram, Slack, and Teams face constant threats… Continue reading WhatsApp, Slack, Teams, and other messaging platforms face constant security risks

Organizations should prepare for the inevitability of cyberattacks on their infrastructure

Organizations reliance on technology has contributed to the fact that their attack surface has grown in size and complexity, according to Armis. Global organizations are facing an unprecedented level of cyber risk due to blind spots in their environmen… Continue reading Organizations should prepare for the inevitability of cyberattacks on their infrastructure

Are executives adequately guarding their gadgets?

Today, individual citizens, rather than businesses or governmental bodies, are the main entry points for cyberattacks. However, security solutions haven’t evolved sufficiently to guard public figures and leaders as they do for large corporate ent… Continue reading Are executives adequately guarding their gadgets?

Baseline standards for BYOD access requirements

49% of enterprises across Europe currently have no formal Bring-Your-Own-Device (BYOD) policy in place, meaning they have no visibility into or control over if and how employees are connecting personal devices to corporate resources, according to a Jam… Continue reading Baseline standards for BYOD access requirements

Network detection and response in the modern era

In this Help Net Security interview, David Gugelmann, CEO at Exeon, sheds light on the current cyber threats and their challenges for network security. He discusses the role of Network Detection and Response (NDR) solutions that leverage machine learni… Continue reading Network detection and response in the modern era

How executives’ personal devices threaten business security

Today, individual people – not businesses or government entities as a whole – are the primary targets, or entry points, for all major cyberattacks, according to Agency. Yet, while the cyber threat landscape has seen this major shift, securi… Continue reading How executives’ personal devices threaten business security

Cybersecurity best practices while working in the summer

IT teams need help to monitor and enforce BYOD policies during summer months when more employees often travel or work remotely. In this Help Net Security video, Jeremy Ventura, Director, Security Strategy & Field CISO at ThreatX, discusses how emp… Continue reading Cybersecurity best practices while working in the summer

Employees worry less about cybersecurity best practices in the summer

IT teams are struggling to monitor and enforce BYOD (Bring Your Own Device) policies during summer months when more employees are often traveling or working remotely, according to ThreatX. With more endpoints and applications in use, and often personal… Continue reading Employees worry less about cybersecurity best practices in the summer