Home Search

BYOD - search results

If you're not happy with the results, please do another search
BYODs

NCSC Releases Action Plan to Help Enterprises Deploy BYODs Securely

0
The increase in remote workforce encouraged several organizations across the globe to embrace the Bring Your Own Devices (BYODs) concept. However, using personal devices...
IoT attacks

How Surge in Remote Work Led to Rise of BYODs and Security Risks

0
The sudden surge in remote work due to the pandemic has encouraged organizations globally to embrace Bring Your Own Devices (BYODs) in the workplace....
BYODs

Surge in Remote Work Drives BYOD; Security Remains Primary Concern

0
A latest survey from cloud security firm Bitglass revealed that the surge in remote work has encouraged businesses globally to embrace BYODs (Bring Your...
Cryptomining

How Illicit Cryptomining Works, And How to Prevent It

0
Whether it’s a surge in value or a decline, cryptocurrencies always make headlines. In addition to price fluctuations, various crypto-related issues such as cryptomining,...
Cryptojacking

Cryptojacking Attacks Rise As Hackers Try to Exploit Linux-based Machines

0
Researchers at Bitdefender Security recently discovered a Romanian-based threat intelligence group hacking Linux machines and targeting systems with weak Secure Shell Protocol (SSH) credentials. The...
DevOps Security

“DevOps Engineers are Constantly Being Hunted by Cybercriminals”

0
Remote work and distributed environments have disrupted long established security models and workflows. Security architects had to re-adapt, re-architect, and rebuild security for remote...
Cloud Security

Cloud is Booming and It Is Going to Get Better in 2025 and Beyond

0
COVID-19 era has brought a major revolution in the IT domain where cloud services are expected to be the backbone of almost all organizations...
cybersecurity, password, password management,

This Device Simplifies Password Management and Protects User Credentials

0
With a mission to provide cybersecurity to individuals to safeguard themselves from threat actors, a Pune-based (Maharashtra, India) cybersecurity enthusiast came up with a...
data management excellence

How to Ensure Data Management Excellence

0
In response to high-profile data breaches, staggering fines, and rapidly evolving privacy and data requirements, CIOs and CISOs are facing a critical mandate: to...
IoT devices

While Employees Work Remotely, Attackers Target Their IoT Devices Left in Office

0
While the pandemic forced employees to work from home, most of their IoT devices were left behind connected to the corporate networks. Unpatched flaws...

MOST POPULAR

RECENT POSTS