Home Search

remote work - search results

If you're not happy with the results, please do another search
DevOps Security

“DevOps Engineers are Constantly Being Hunted by Cybercriminals”

0
Remote work and distributed environments have disrupted long established security models and workflows. Security architects had to re-adapt, re-architect, and rebuild security for remote...
Health care data breaches

Cyber Insurance for Health Care Organizations

0
Cyberattacks are dangerous for any organization. Health care organizations can be particularly vulnerable, however, because breaches often reveal sensitive patient information and may result...
Cloud Security

Cloud is Booming and It Is Going to Get Better in 2025 and Beyond

0
COVID-19 era has brought a major revolution in the IT domain where cloud services are expected to be the backbone of almost all organizations...
Eric Brinkman, Chief Product Officer at Cobalt

“PtaaS Offers a Faster and More Thorough Process of Vulnerability Discovery”

0
Not too long ago, in August 2021, Conti operators successfully targeted SAC Wireless, a U.S.-based Nokia Subsidiary, with a ransomware attack. After an internal...
zero trust

Gaining Organizational Trust for Zero Trust

0
The notion of Zero Trust – never trust, but always verify - has been gaining momentum for more than a decade. With so much...
Cloud Forensics

Cloud Computing Is the Future and Here Are the Latest Trends

0
In today’s world of hyper-connectivity enterprises are investing in hybrid Cloud solutions, PaaS systems, augmented reality, and open-partner ecosystems. If the past has taught...
AI and ML

“AI and ML Will Be Enablers for Cybersecurity for the Foreseeable Future”

0
In the first half of 2021, cyber adversaries pried on opportunities to attack enterprise infrastructure and critical industries. Even the slightest security mismanagement motivated...
Acronis Cyber Readiness Report, cyberattacks in India, cybercrime in India, India’s Private Sector

Cybersecurity is a Low Priority for India’s Private Sector

0
In the movie Die Hard 4.0, John McClane and a young hacker team up to thwart the plans of cyber-terrorist Thomas Gabriel in Washington...
supply chain attacks

3 Steps Businesses Can Take to Protect Themselves From Software Supply Chain Attacks

0
In August, the White House hosted a meeting with some of the most powerful CEOs in the world; from Apple to JPMorgan. The topic...
SOC analyst

Top 5 Skills Every SOC Analyst Needs to Have

0
As the landscape of cyberthreats expands, it is imperative for enterprises to focus on employing security operations center analysts, also known as SOC analysts,...