Despite many companies' best efforts to combat cybercrime, it persists and is increasingly costly. Here’s a look at some of the latest technologies that may be able to turn the tide against malicious hackers because they can still deliver performance and function at the necessary scale.
As we have done in previous years, the Security magazine team compiled our favorite articles from this year. As we head into 2021, we hope you take a moment to review some of 2020’s top articles about lessons learned, thought leadership, security challenges and good practices.
As companies think about how to navigate this new landscape of privacy laws and cybersecurity threats, here are a few major trends and predictions to consider:
Publicly available information (PAI) can give your security enterprise actionable data. Often, however, when an enterprise successfully manages the variety, volume and velocity associated with PAI, that intelligence is often processed in silos. Here's how to ensure your organization can overcome the silos and increase situational awareness for the enterprise.
Meet Issak Davidovich, Vice President of Research and Development at C2A Security. According to Davidovich, the implementation of driver assistance technologies and cybersecurity goes hand-in-hand, and the auto industry is taking its first steps on creating in-vehicle security standards. Here, we talk to him about what this means for automotive cybersecurity.
The talent war is real, the strength in numbers favors our opponent, we now have the original digital transformations we were planning pre-COVID, and now we have additional transformations that we have to take on to enable a distributed workforce that was previously never a consideration. There simply are not enough properly equipped resources to meet global demand, and even then, an organization is only as strong as its weakest analyst. The adversary knows that and, leverages the vulnerabilities in human behavior to advance their position in the “infinite game” of cyber warfare.
Nearly two-thirds of workers who have been working remotely during the pandemic would like to continue to do so. While working from home, the boundaries between work and life can decrease or disappear altogether, as employees are using their corporate devices for personal use more than ever before. As we enter the holiday season, IT teams can expect this work/life blend to translate into increased online shopping on corporate devices, which in turn exposes the network to additional cybersecurity threats.
Contact-tracing solutions are often talked about as a COVID-19 response strategy for enterprises as they resume travel and continue business operations. In defining a digital contact tracing strategy, enterprises must decide whether or not they even need one distinct from efforts undertaken by local health authorities. Learn here how to implement a digital contact-tracing strategy, as well as how to sort through the large volume of options when it comes to contact tracing to determine what makes the most sense for your security team and your organization.
Today’s customers rarely bat an eye when they receive a security alert from a company with which they do business. That’s because large tech companies have baked identity confirmation and notifications of suspicious activities into their everyday user experiences.
Domestic critical infrastructure is arguably now more at risk than at any point in living memory, and certainly in a peacetime context. As a consequence of the pandemic, there have been multiple attacks on electricity grids, water systems and energy organizations, election locations, and newly distributed enterprises. What is the best way to go about protecting what is at risk?