The Synopsys Cybersecurity Research Center (CyRC) analyzed more than 3,000 popular Android applications to assess the state of mobile app security during the COVID-19 pandemic. The study targeted the most downloaded and highest grossing apps across 18 categories, many of which have seen explosive growth during the pandemic.
We have come to a point in the world where IT is being called upon more than ever due to the surge in remote work and technology’s increasingly significant role in driving business direction. The pandemic disruption has increased internal-control risks, leaving every business to adapt and have an increased focus on the overall technology vulnerabilities. To accomplish all they need to keep their organization secure, IT departments have been brought to the realization that they must prioritize building trust among their business partners – but that trust doesn’t happen in a flip of a switch, there’s a variety of steps both parties have to take in order to reach the light at the end of the tunnel.
Videoconferencing has been around for a surprisingly long time. In fact, the first call involving both audio and video links has been traced all the way back to 1927 in a call that took place between officials in Washington, DC and the president of AT&T in New York. Although it was laughably primitive by current standards, electronic conferencing technology has never stopped growing in either refinement or use.
The 2021 SonicWall Cyber Threat Report goes inside the stories that headlined 2020, and takes a closer look at new and disruptive cyber threats to provide insight into the evolving cyber threat landscape. Major findings of the new in-depth SonicWall report include:
As vaccine distribution continues through 2021, the companies managing the process must proactively think about their current risk level, how they can decrease that risk, and how they can strengthen their security posture moving forward.
Virginia becomes the first state in the U.S. to permanently enact COVID-19 workplace safety and health standards. In addition to requiring all public-facing employees to wear masks, the standards ensure ready access to hand sanitizer and the regular cleaning of common work spaces. Employers must train employees on COVID-19 safety and to develop infectious disease and preparedness response plans. The new permanent regulations include guidelines for returning to work and communicating about employees who test positive and potential exposures.
Michael Oberlaender has had cybersecurity leadership positions and CSO/CISO titles at enterprises around the world. He’s recovered companies from data breaches, built cyber-hardening strategies and policies, implemented cybersecurity budgets, forged relationships and communications with the C-suite, analyzed risks, and dealt with privacy laws around the world.
As organizations bring their employees back to the workplace, many are looking to leverage location technology as a means to increase safety. Return-to-work solutions ranging from digital contact tracing and social distancing monitoring to sanitation alerts and occupancy analytics are being explored and embraced in varying degrees around the world. However, it’s imperative that any technology deployed works a double shift to also provide value in the post-pandemic times. The same location technology infrastructure used to address infection prevention and mitigation can be used to complement and enhance traditional security efforts.
ON DEMAND: Listen to healthcare security experts as they discuss their journey through the Covid-19 pandemic – from response to recovery, what they saw, and what they learned. This webinar will discuss how these experts reacted to the pandemic, the planning, the changes in their operations and staffing, and dealing with this new unforeseen risk.
ON DEMAND: The insider threat—consisting of scores of different types of crimes and incidents—is a scourge even during the best of times. But the chaos, instability and desperation that characterize crises also catalyze both intentional and unwitting insider attacks. Learn how your workers, contractors, volunteers and partners are exploiting the dislocation caused by today's climate of Coronavirus, unemployment, disinformation and social unrest.
ON DEMAND: IP geolocation data, which maps the IP address of a device connected with the Internet to a geographic location, has been helping inform online business decisions for almost 20 years. Although it is no longer the new kid on the digital block, it has become an ever-more essential tool, addressing more varied business needs and applications than ever before – all arising from the growth of anonymous incoming Internet traffic as well as increased numbers of remote workers. This is driving a need for accurate location insights at organizations around the globe.