Using real-time monitoring to identify and mitigate threats

From identifying unusual behavior patterns to detecting unauthorized access, real-time monitoring provides a view of your digital environment, ensuring that threats are spotted and dealt with before they can cause harm. In this Help Net Security video,… Continue reading Using real-time monitoring to identify and mitigate threats

The security dilemma of data sprawl

As hybrid work becomes the norm in business, so does data sprawl. Data sprawl refers to the spread of company information to various places, which often comes from dispersed and unmanaged cloud app use. In fact, within businesses worldwide, 1 in 5 empl… Continue reading The security dilemma of data sprawl

How to improve employees’ cybersecurity behavior

We already have cybersecurity behaviors we learned from elsewhere, especially those who have grown up with technology. Initially, cybersecurity starts from home and school, and it is very hard nowadays to exist without some sort of online presence. Whe… Continue reading How to improve employees’ cybersecurity behavior

How to improve employees’ cybersecurity behavior

We already have cybersecurity behaviors we learned from elsewhere, especially those who have grown up with technology. Initially, cybersecurity starts from home and school, and it is very hard nowadays to exist without some sort of online presence. Whe… Continue reading How to improve employees’ cybersecurity behavior

Microsoft Teams: A channel for sensitive business information sharing that needs better backup

Hornetsecurity has found an urgent need for greater backup for Microsoft Teams with 45% of users sending confidential and critical information frequently via the platform. Research commissioned by the company highlights the often-overlooked need for Te… Continue reading Microsoft Teams: A channel for sensitive business information sharing that needs better backup

Monitoring the impact of security solutions on user experiences is critical

Modern organizations are challenged by conflicting demands to secure the enterprise while delivering excellent end-user experiences, according to Broadcom Software. The survey found more than half of respondents prioritize security over the end-user ex… Continue reading Monitoring the impact of security solutions on user experiences is critical

80% of organizations experienced employees misusing and abusing access to business apps

Organizations continue to operate with limited visibility into user activity and sessions associated with web applications, despite the ever-present risk of insider threats and credential theft, a CyberArk research reveals. While the adoption of web ap… Continue reading 80% of organizations experienced employees misusing and abusing access to business apps

Younger generations care little about cybersecurity

SailPoint released a survey which aimed to identify gaps within organizations’ cybersecurity postures by analyzing workforce behaviors that blur work and personal lives, leading to security pitfalls. According to the findings, 59% of all workers are us… Continue reading Younger generations care little about cybersecurity

Consumers aware of travel cyber risks, still not putting their digital wellness first

68% of Americans plan to travel for leisure this summer, with 12% doing so internationally, a McAfee survey reveals. While 68% of U.S. consumers report that they are connected to more devices and digital activity since the start of the pandemic, roughl… Continue reading Consumers aware of travel cyber risks, still not putting their digital wellness first

Enterprises observing uptick in risky behaviors since shift to remote work

Tanium released a report to evaluate the primary IT operations and security challenges organizations have faced amid the large-scale shift to remote work in the COVID-19 era, and how businesses plan to adapt moving forward. The report was conducted by … Continue reading Enterprises observing uptick in risky behaviors since shift to remote work