BYOD
Shadow IT Risks CISOs Should Know
August 17 by Lisa MorganThe CISO can't protect that which is unknown. Hence the need for asset management and CASB tools that help explain the actual ecosystem. Advisory firm CEB estimates that 40% of all IT spending occurs...
Using ZTNA to Deliver the Experience Users Want
October 12 by Seth AdlerUsers need identical access to private apps across all devices, locations and application types. Providing access from these devices, without compromising security was at one point an impossibility. N...
Why IT leaders Should Consider A Zero Trust Network Access Strategy
October 12 by Seth AdlerCompanies are leveraging the explosion of public cloud solutions to optimize business processes and deliver products and services more quickly and at a lower overall cost.
How To Secure The Distributed Digital Enterprise On Any Endpoint, Anywhere.
August 14 by Seth AdlerExamine a self-contained platform that continuously protects your organisation from evolving cyber threats. Realise secure access to any application, device and files from anywhere without the need fo...
IOTW: Shiny Hunters Is The New Threat Actor In Town
May 26 by Seth AdlerDuring the first two weeks of May, over 73 million user records across over at least 10 different organizations showed up on the dark web. The hacker group Shiny Hunters claims credit.
How To Keep Remote Workers Secure During COVID-19 And Other Crises
April 07 by Esther SheinThe headlines have been screaming about Zoom bombing lately, and it was just a matter of time before hackers took advantage of a remote workforce to infiltrate video conference calls. There has also b...
Incident Of The Week: Apple iPhones Affected By Data Breach Discovered By Google’s Project Zero Security Researchers
September 06 by Kayla MatthewsApple has patched a series of iPhone vulnerabilities discovered by Google’s Project Zero security researchers allowing malware to be embedded into iOS devices. Infiltrated smartphones were capable of...
BYOD Rules And The Future Of Medical Data Security
April 24 by Bryan FieldingHealthcare organizations have always been extremely attractive targets to cyber criminals, so the increasing use of personal or third party mobile devices highlights a need for the implementation of m...
The Cyber Security ‘Perimeter:’ Has It Simply Vanished?
May 10 by Dan GundermanThe concept of the “perimeter” is something that has long intrigued security practitioners. But is that castle-and-moat strategy a thing of the past?
Is BYOD Worth The Risk?
October 30 by CSHub.com Editorial StaffAs technology continues to advance and BYOD (Bring Your Own Device) workplaces become more and more commonplace, IT leaders everywhere are faced with a critical dilemma: Do we embrace the more product...