Baseline standards for BYOD access requirements

49% of enterprises across Europe currently have no formal Bring-Your-Own-Device (BYOD) policy in place, meaning they have no visibility into or control over if and how employees are connecting personal devices to corporate resources, according to a Jam… Continue reading Baseline standards for BYOD access requirements

Network detection and response in the modern era

In this Help Net Security interview, David Gugelmann, CEO at Exeon, sheds light on the current cyber threats and their challenges for network security. He discusses the role of Network Detection and Response (NDR) solutions that leverage machine learni… Continue reading Network detection and response in the modern era

How executives’ personal devices threaten business security

Today, individual people – not businesses or government entities as a whole – are the primary targets, or entry points, for all major cyberattacks, according to Agency. Yet, while the cyber threat landscape has seen this major shift, securi… Continue reading How executives’ personal devices threaten business security

Cybersecurity best practices while working in the summer

IT teams need help to monitor and enforce BYOD policies during summer months when more employees often travel or work remotely. In this Help Net Security video, Jeremy Ventura, Director, Security Strategy & Field CISO at ThreatX, discusses how emp… Continue reading Cybersecurity best practices while working in the summer

Employees worry less about cybersecurity best practices in the summer

IT teams are struggling to monitor and enforce BYOD (Bring Your Own Device) policies during summer months when more employees are often traveling or working remotely, according to ThreatX. With more endpoints and applications in use, and often personal… Continue reading Employees worry less about cybersecurity best practices in the summer

Venn Software Snags $29M to build MDM for Laptops Technology

New York startup scores early stage financing to build new technology to replace virtual desktop infrastructure.
The post Venn Software Snags $29M to build MDM for Laptops Technology appeared first on SecurityWeek.
Continue reading Venn Software Snags $29M to build MDM for Laptops Technology

Navigating cybersecurity in the age of remote work

In this Help Net Security interview, Jay Chaudhry, CEO at Zscaler, talks about connecting and securing remote employees and their devices to access organizational resources from any location. He discusses the potential risks of remote VPN access, the i… Continue reading Navigating cybersecurity in the age of remote work

Blacklist untrustworthy apps that peek behind your firewall

With an increasing number of endpoints and expanding attack surfaces, dodgy apps can offer a way around your firewall. Due to data privacy concerns, Montana has passed the first bill in the United States to ban TikTok. Previously, India has banned 59 C… Continue reading Blacklist untrustworthy apps that peek behind your firewall

Lynyrd Skynyrd Answers “Who Should Create an Org’s BYOD Policy?”

The worst of LastPass’s year-long battle with an attacker occurred through a personal device, on a home network, putting BYOD back in the spotlight. And for the past three months, most boards, CIOs, and CISOs I know are taking the opportunity to reeval… Continue reading Lynyrd Skynyrd Answers “Who Should Create an Org’s BYOD Policy?”