Home Search
COVID-19 - search results
If you're not happy with the results, please do another search
Shadow IT is Creating an Ever-growing Problem with Remote Teams
Most organizations have a centralized IT department with the apps and software approved for certain activities. However, remote workers might choose to find other...
ICS is Becoming a Hot Favorite of Threat Actors: Kaspersky Report
ICS (Industrial Control System) or SCADA have faced large volumes of attacks from notorious threat actors in the recent past. Be it the China-linked...
This “World Backup Day,” Let’s Look at the H.O.L.I.S.T.I.C. Reasons Behind Data Loss
Imagine one morning you wake up and check your mobile phone for emails and messages and you notice that there is no new data...
Zoom’s Video-teleconferencing Platform Still at Risk: FBI Warns
Despite regular security updates and features, cyberthreats on Zoom applications have become rampant. In the wake of the pandemic, the popular video conferencing platform...
Pledge to Backup Your Data This World Backup Day
Information is new money in this modern digital world. Everything revolves around information, and it has become the fuel for many businesses. For instance,...
“Build a more robust pipeline for cyber talent”
It has been an age-old myth that women prioritize family over work. Women are under-represented in tech and leadership. According to an (ISC)² Cybersecurity...
“I personally believe girls are naturally blessed analysts and can make great research scholars”
COVID-19 has changed the ways businesses operate today. Like health care and banking, cybersecurity was one of the most impacted industries with phishing and...
Why Zero Trust Model is a Top Priority for Security Leaders Today
Ever since the pandemic hit, companies globally are trying to progress their digital capabilities and rapidly undertaking business transformation initiatives. Despite the revenue declines...
For many roles, there are few, if any, women candidates
It has been an age-old myth that women prioritize family over work. Women are under-represented in tech and leadership. According to an (ISC)² Cybersecurity...
Five Social Engineering Trends to Watch for 2021
Cybercrime continues to be a growing threat and attack methods constantly evolve with each passing day. At the core of almost every successful cyberattack,...