Home Search

BYOD - search results

If you're not happy with the results, please do another search
Singapore cybersecurity

MAS Tightens Rules for Financial Firms in Singapore Post SolarWinds Cyberattack

0
The SolarWinds cyberattack has affected almost all the sectors around the globe. Taking into account the outreach and aftermath of the attack, the Monetary...
2021 Security Predictions

2021 Security Predictions: Endpoint Security is of Utmost Importance

0
2020 has been an unforgettable year – from a virus upending the world to a sudden shift to remote workforce, we have seen it...
cyber-tech trends

Seven Impactful Cyber-Tech Trends of 2020 and What it Means for 2021

0
Every year I like to research and commentate on the most impactful security technology and business happenings from the prior year. This year is...
remote work, Remote workforce security

WFH Concern! 73% of Executives Worried About Distributed Workforce Risks

0
Cybersecurity management firm Skybox Security stated that 73% of security and IT executives across the globe are concerned about new vulnerabilities and risks introduced...
Endpoint Security Interview with Karmesh Gupta

“Unified solutions could hold the key in enforcing endpoint security policies”

0
The exponential increase in endpoints in the last nine months has hugely contributed to a dramatic rise in network and endpoint perimeter breaches. However,...
FireEye Acquires Respond Software

Barracuda Acquires Fyde to Boost Cloud Access Solution

0
Cloud-based security solutions provider Barracuda has acquired Fyde, a Zero Trust Network Access (ZTNA) provider based in Palo Alto, to develop its SASE CloudGen...
endpoint detection and response

The Evolving Role of Endpoint Detection and Response

0
With the increase in myriad devices and its constant use in this connected world, cybersecurity is a major concern for both users and enterprises....

Endpoint Security Extends to the Cloud

0
The notion and definition of endpoints have evolved with the increased adoption of cloud computing and the virtualization of IT resources. Not long ago,...
In tandem with technology and deployment, the growth of end-user devices also created multiple attack vectors for cybercriminals in endpoint security. The demand for advanced endpoint security solutions has increased with end-user devices.

These are the Common Attack Vectors in Endpoint Security

0
With remote work becoming the new normal, organizations globally are getting usual to connect and secure their remote employees virtually. The demand for advanced...
endpoint solutions

Organizations Need to Secure Their Endpoints with Smarter Solutions

0
Organizations are being attacked at an increasing rate with breaches causing significant financial and reputational consequences. In the State of Endpoint Security Risk Whitepaper,...

MOST POPULAR

RECENT POSTS