Why virtual desktops make sense for a virtual workforce

Across the country businesses and public agencies alike are holding virtual job fairs and summits and talking about the effects of the virtual workforce. Faced with skilled labor shortages and the pandemic-driven move to remote working, the public and … Continue reading Why virtual desktops make sense for a virtual workforce

X-Force Report: No Shortage of Resources Aimed at Hacking Cloud Environments

As cybercriminals remain steadfast in their pursuit of unsuspecting ways to infiltrate today’s businesses, a new report by IBM Security X-Force highlights the top tactics of cybercriminals, the open doors users are leaving for them and the burgeoning marketplace for stolen cloud resources on the dark web. The big takeaway from the data is businesses […]

The post X-Force Report: No Shortage of Resources Aimed at Hacking Cloud Environments appeared first on Security Intelligence.

Continue reading X-Force Report: No Shortage of Resources Aimed at Hacking Cloud Environments

Security Awareness Training: Beyond Cliche Advice for Remote Workers

I’ve read what seems like a million articles on how to make security awareness training more effective for remote workers. And honestly, they all seem to say the same thing. Teach employees the basics and give them a list of things they should do to keep your data safe. Almost every article includes the same […]

The post Security Awareness Training: Beyond Cliche Advice for Remote Workers appeared first on Security Intelligence.

Continue reading Security Awareness Training: Beyond Cliche Advice for Remote Workers

Shadow IT, Cloud-Based Malware Increase AppSec Risks

Cloud application security risks continue to rise as malware delivered by cloud applications continues to grow, according to a study by Netskope. The biannual study also highlighted the potential for critical data exfiltration tied to employees depart… Continue reading Shadow IT, Cloud-Based Malware Increase AppSec Risks

Hairpinning: The Bottleneck in Most Secure Web Gateway Architectures

Secure Web Gateways (SWGs), software for controlling access to websites and SaaS not managed by corporate IT, have evolved from hardware appliances installed on premises, to software running on end user devices with varying degrees of interaction with… Continue reading Hairpinning: The Bottleneck in Most Secure Web Gateway Architectures

What We Can Learn from the Colonial Pipeline Breach

On June 8, 2021, Joseph Blount, President and Chief Executive Officer of Colonial Pipeline, appeared before the United States Senate Committee on Homeland Security and Governmental Affairs regarding the breach that injected ransomware into their serve… Continue reading What We Can Learn from the Colonial Pipeline Breach

Six Key Characteristics of a Modern ZTNA Solutions

Even as organizations continue adoption of cloud technologies, the need for secure access to on-premises resources has not gone away. In fact, as many companies navigate a return to the office while simultaneously supporting a portion of the workforce… Continue reading Six Key Characteristics of a Modern ZTNA Solutions

Remote Work Lessons Learned

To say that the world was unprepared for what happened in March of 2020 would be a gross understatement. Nobody needs a reminder of the seismic changes that the coronavirus pandemic introduced. Large enterprises were caught off guard, to be sure. But … Continue reading Remote Work Lessons Learned

Navigating Cybersecurity Gaps in Uncertain Times

If cybersecurity leaders and teams think this year will be quieter and easier than 2020, they are mistaken. The remote work trend launched by COVID-19 is morphing into a new hybrid environment that has some employees working at home full time, others … Continue reading Navigating Cybersecurity Gaps in Uncertain Times

Navigating Cybersecurity Gaps in Uncertain Times

If cybersecurity leaders and teams think this year will be quieter and easier than 2020, they are mistaken. The remote work trend launched by COVID-19 is morphing into a new hybrid environment that has some employees working at home full time, others … Continue reading Navigating Cybersecurity Gaps in Uncertain Times