Home Search

remote work - search results

If you're not happy with the results, please do another search
Cryptocurrency scams in Australia

Hackers Target Australians with Phishing Attacks Amid COVID-19 Crisis

0
With majority of the employees working remotely, cybercriminals are taking advantage of the ongoing COVID-19 crisis across the globe. Several industry experts stated that...
Verizon’s Chatbox Flaw Leaks Customers’ Personal Information

Cybercriminals Target Zoom Domains to Distribute Malware

0
With the COVID-19 pandemic, organizations across the world restricted their employees to work from home as part of social distancing and to prevent the...
covid-19 vaccine, vaccine

Cybercrime Will Cost the World US$6 Trillion by the End of the Year: Study

0
The global pandemic of COVID-19 will continue to have a massive impact on cyberspace. In fact, the damages caused by cybercrime is poised to...
Multiple Banks and Telecoms in Hungary Affected in a DDoS Attack

Attackers Launch DDoS Attack on Food Delivery Startup Liefrando

0
Precautionary measures to mitigate the ongoing COVID-19 outbreak led to swift change in the work life of the businesses and people globally. Social distancing...

COVID-19: EC-Council Announces free Cyber Training and Education Support Services

0
With COVID-19 restricting offices and workspace to homes and impacting the cybersecurity sector at a massive scale, the world’s largest cybersecurity certification body, EC-Council,...
Supply chain

Don’t Overlook the Security of Your Supply Chain

0
CISO MAG EDITORIAL Not long ago, the IT Head---and we are using this as a generic term--of an organization was concerned with securing all the...
trend micro's 2020 predictions

Trend Micro’s 2020 Predictions – Escalating Cloud and Supply Chain Risk

0
Trend Micro Incorporated today announced its 2020 predictions report, which states that organizations will face a growing risk from their cloud and the supply...
Worm, Virus

A New Defense Against Wormable Exploits

0
By Micha Rave, Sr. Director, Zero-Trust Product Management, Proofpoint Here’s some good news. Your team doesn’t have to be vulnerable to wormable exploits like BlueKeep,...
endpoint protection

The Big 3 Battles we are fighting for Endpoint Security

0
Contributed by Brian Madden, Lead Feld Technologist, End-User Computing, VMware This article first appeared in CISO MAG. To read more articles like these, subscribe to...

Software-defined perimeters challenge the corporate VPN on security

0
By Etay Bogner, CEO of Meta Networks When it comes to network security, interest is heating up around software-defined perimeter solutions (SDP)—and for good reason. The...