Home Search
remote work - search results
If you're not happy with the results, please do another search
Hackers Target Australians with Phishing Attacks Amid COVID-19 Crisis
With majority of the employees working remotely, cybercriminals are taking advantage of the ongoing COVID-19 crisis across the globe. Several industry experts stated that...
Cybercriminals Target Zoom Domains to Distribute Malware
With the COVID-19 pandemic, organizations across the world restricted their employees to work from home as part of social distancing and to prevent the...
Cybercrime Will Cost the World US$6 Trillion by the End of the Year: Study
The global pandemic of COVID-19 will continue to have a massive impact on cyberspace. In fact, the damages caused by cybercrime is poised to...
Attackers Launch DDoS Attack on Food Delivery Startup Liefrando
Precautionary measures to mitigate the ongoing COVID-19 outbreak led to swift change in the work life of the businesses and people globally. Social distancing...
COVID-19: EC-Council Announces free Cyber Training and Education Support Services
With COVID-19 restricting offices and workspace to homes and impacting the cybersecurity sector at a massive scale, the world’s largest cybersecurity certification body, EC-Council,...
Don’t Overlook the Security of Your Supply Chain
CISO MAG EDITORIAL
Not long ago, the IT Head---and we are using this as a generic term--of an organization was concerned with securing all the...
Trend Micro’s 2020 Predictions – Escalating Cloud and Supply Chain Risk
Trend Micro Incorporated today announced its 2020 predictions report, which states that organizations will face a growing risk from their cloud and the supply...
A New Defense Against Wormable Exploits
By Micha Rave, Sr. Director, Zero-Trust Product Management, Proofpoint
Here’s some good news. Your team doesn’t have to be vulnerable to wormable exploits like BlueKeep,...
The Big 3 Battles we are fighting for Endpoint Security
Contributed by Brian Madden, Lead Feld Technologist, End-User Computing, VMware
This article first appeared in CISO MAG. To read more articles like these, subscribe to...
Software-defined perimeters challenge the corporate VPN on security
By Etay Bogner, CEO of Meta Networks
When it comes to network security, interest is heating up around software-defined perimeter solutions (SDP)—and for good reason.
The...