Remote work pushes video conferencing security to the fore

IT professionals are becoming increasingly concerned about the growing number of cyber threats and foreign attacks capable of impacting video conferencing. In this Help Net Security video, George Waller, EVP of Zerify, talks about the rise of remote work and the importance of video conferencing security for organizations of all sizes. The post Remote work […]

Continue Reading

CISOs, rejoice! Security spending is increasing

Three factors influencing growth in security spending are the increase in remote and hybrid work, the transition from virtual private networks (VPNs) to zero trust network access (ZTNA) and the shift to cloud-based delivery models, according to Gartner. “The pandemic accelerated hybrid work and the shift to the cloud, challenging the CISO to secure an […]

Continue Reading

Homeworkers putting home and business cyber-safety at risk

BlackBerry published a European research exposing the cybersecurity risk created by cost-conscious homeworkers who prioritise security behind price, usability and ease of set up in their purchase of domestic smart devices. 32% of European home workers who own a smart device surveyed said security was a top three factor when choosing a smart device, compared […]

Continue Reading

Companies struggle to govern their new cloud environments

Organizations are struggling to sufficiently secure new cloud environments implemented during the pandemic, while maintaining legacy equipment and trying to adapt their overall security strategy to the evolving landscape, according to a Proofpoint study released in collaboration with The Cloud Security Alliance (CSA) reveals. This Help Net Security video highlights how organizations adopt cloud infrastructures […]

Continue Reading

Disk wiping malware knows no borders

Fortinet announced the latest semiannual FortiGuard Labs Global Threat Landscape Report which revealed that ransomware threat continues to adapt with more variants enabled by Ransomware-as-a-Service (RaaS). Additional highlights of the report: Work-from-anywhere (WFA) endpoints remain targets for cyber adversaries to gain access to corporate networks. Operational technology (OT) and information technology (IT) environments are both […]

Continue Reading