Home Search
remote work - search results
If you're not happy with the results, please do another search
“DevOps Engineers are Constantly Being Hunted by Cybercriminals”
Remote work and distributed environments have disrupted long established security models and workflows. Security architects had to re-adapt, re-architect, and rebuild security for remote...
Cyber Insurance for Health Care Organizations
Cyberattacks are dangerous for any organization. Health care organizations can be particularly vulnerable, however, because breaches often reveal sensitive patient information and may result...
Cloud is Booming and It Is Going to Get Better in 2025 and Beyond
COVID-19 era has brought a major revolution in the IT domain where cloud services are expected to be the backbone of almost all organizations...
“PtaaS Offers a Faster and More Thorough Process of Vulnerability Discovery”
Not too long ago, in August 2021, Conti operators successfully targeted SAC Wireless, a U.S.-based Nokia Subsidiary, with a ransomware attack. After an internal...
Gaining Organizational Trust for Zero Trust
The notion of Zero Trust – never trust, but always verify - has been gaining momentum for more than a decade. With so much...
Cloud Computing Is the Future and Here Are the Latest Trends
In today’s world of hyper-connectivity enterprises are investing in hybrid Cloud solutions, PaaS systems, augmented reality, and open-partner ecosystems. If the past has taught...
“AI and ML Will Be Enablers for Cybersecurity for the Foreseeable Future”
In the first half of 2021, cyber adversaries pried on opportunities to attack enterprise infrastructure and critical industries. Even the slightest security mismanagement motivated...
Cybersecurity is a Low Priority for India’s Private Sector
In the movie Die Hard 4.0, John McClane and a young hacker team up to thwart the plans of cyber-terrorist Thomas Gabriel in Washington...
3 Steps Businesses Can Take to Protect Themselves From Software Supply Chain Attacks
In August, the White House hosted a meeting with some of the most powerful CEOs in the world; from Apple to JPMorgan. The topic...
Top 5 Skills Every SOC Analyst Needs to Have
As the landscape of cyberthreats expands, it is imperative for enterprises to focus on employing security operations center analysts, also known as SOC analysts,...