Fallout from giants at the top is one of the largest drivers of cyber-impacts on everyday people and companies.
Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar YouTube video (transcript included).
An on premise hacker can cripple even the best cybersecurity defenses.
Simply implementing best practices is not enough to address the risk coming from your own employees.
A detailed look at underground forums shows that cybercriminals aren’t sure where to look on the heels of the GandCrab ransomware group shutting its doors – and low-level actors are taking advantage of that by developing their own strains.
It’s been around forever, but in a modern digital era marked by influence campaigns and deep fakes, information warfare has become much easier to carry out.
“Never trust, always verify” is a solid security concept — but it’s important to realize that putting it into practice can be complex.
Dino Dai Zovi, mobile security lead at Square, discusses ongoing transformation in security’s role in the workplace during the keynote.
Enterprises should recognize the data security risk that Slack, Teams or TeamViewer could introduce and address it.
Twenty years in, enterprise VPNs occupy a uniquely solid position in a changing landscape.