Home Search

remote work - search results

If you're not happy with the results, please do another search
managed services provider (msp)

21 Questions to Determine if Your MSP is Ready for Prime Time or is...

0
As if 2020 wasn’t challenging enough for businesses, reports warn that Managed Service Providers (MSPs), often contracted to provide outsourced IT and cybersecurity services,...
Penetration Testing, continuous testing, security testing

6 Steps to Boost your Online Security

0
The year 2020 is certainly considered as the year of change. The pandemic has changed/impacted every facet of life — from the way we...
Insider Threats

Why Insider Threat Presents a Big Risk to Financial Services Organizations

0
In today’s highly regulated environment, financial services organizations are trusted with far more than just money; they are also responsible for keeping customers’ highly...
Endpoint Security Interview with Karmesh Gupta

“Unified solutions could hold the key in enforcing endpoint security policies”

0
The exponential increase in endpoints in the last nine months has hugely contributed to a dramatic rise in network and endpoint perimeter breaches. However,...

CSPs Need to Adopt Smarter Ways to Combat Evolving DDoS Attacks

0
Donny Chong is the Product Director at Nexusguard. He is responsible for designing the company's solutions for the enterprise. His broad ten-year tenure includes...

What is the “Cyberchology of Human Error” in Cybersecurity?

0
A joint report from cybersecurity firm ESET and business psychology provider the Myers-Briggs Company revealed that human error has led to an increase in...
Financial Sector

65% of Financial Services Firms Suffered a Cyberattack Last Year

0
A new research, “Cybersecurity Challenges in Financial Services,” from data security provider HelpSystems revealed that 65% of major financial services organizations have suffered a...
1Kosmos panel discussion

Make Passwords Great Again

0
CISO MAG recently hosted a panel discussion with Michael Engle, Chief Strategy Office, 1Kosmos; Christian Adam, MD Cybersecurity Technology, BNY Mellon; and Jerry Kowalski,...
actively exploited vulnerabilities, Vulnerabilities, risk-based vulnerability management

Old Unpatched Vulnerabilities Could Invoke Cyberattacks and Malware

0
The “new normal” business operations left most organizations vulnerable to new attack vectors. From database misconfigurations to unpatched vulnerabilities, organizations suffered several challenges in...
cybersecurity pressure

How Organizations are Defending Cyberattacks During the Pandemic

0
Businesses across the globe are implementing new cybersecurity measures to prevent security incidents during the pandemic. Despite rising cyberthreats due to remote work, nearly...