COVID-19: Modern society has never seen anything like it, and neither have financial markets. Venture capitalist Alberto Yépez analyzes the impact of the disease caused by the new coronavirus on public and private companies' valuations, as well as technology buyers and the threat environment.
Cybercriminals, and perhaps nation-state hackers, that are attempting to take advantage of the COVID-19 pandemic are now turning their attention to mobile devices to spread malware, including spyware and ransomware, security researchers warn.
As a result of the COVID-19 outbreak, cybercriminals increasingly are targeting organizations that now have more remote workers and fewer IT and security staff at the ready to mitigate hacker attacks and intrusions, security experts say.
With U.S. stock markets suffering their worst day since 1987 on Monday, most technology firms took a hit as Wall Street continues to be rattled by the COVID-19 crisis. Experts predict this will drive fresh waves of consolidation and M&A in the cybersecurity market, as well as growth in hot areas.
It's no exaggeration to say that, in the midst of the COVID-19 pandemic, we now have the largest-ever global remote workforce. And with it comes an expanded attack surface that requires extra attention. Phil Reitinger of the Global Cyber Alliance shares five tips for securing the remote workforce.
President Donald Trump has signed legislation that bans telecommunication firms from using federal funds to buy equipment from companies that are deemed a "national security threat" and provides funding for "rip and replace." The measure takes aim at Chinese firms Huawei and ZTE.
To help deal with the coronavirus outbreak, healthcare providers are examining how to implement or expand the use of telehealth services to remotely evaluate and care for patients. But these providers need to carefully consider privacy and security issues as they work to quickly offer these services.
Continuously analyze suspicious traffic patterns and exposed services, anywhere in the world, with Expanse Behavior
In a time where networks evolve each day and include a diverse collection of Internet Assets such as IP addresses, domains, and certificates - how do you ensure that none of your Internet Assets...
The Zero Trust model of information security has become a fixture in both the strategies of enterprise security teams and the roadmaps of security solution developers, and for good reason. Perimeter-focused security architectures that default to high trust levels on the internal network continue to fail disastrously...
In the current landscape, sophisticated technology plays a crucial role - even one cyber incident can potentially turn into a disaster. Today, cybersecurity is not just the responsibility of IT specialists, but one of the main concerns for leaders of numerous businesses of all sizes across all industries.
The cybersecurity threat landscape is evolving as a result of the growth of the internet of things, the explosion in the use of the cloud and many other factors. Protecting data is this environment requires a "war time" mentality.
Can you lead board-level initiatives to understand how data and money flow through...
Security operations teams are adding automation to make their lives more comfortable and their organizations safer. The challenge, however, is that SOC managers are still unable to quantify and demonstrate the value of automation to senior executives and other stakeholders.
An increasingly hostile threat landscape,...
Moderator: Bharat Anand, CTO & CSO, NATGRID
Speaker: Col. K. P. Bhat, Consultant & Advisor, NCIIPC, Govt
Nation-state attacks often have close links to military intelligence or state control apparatus with a high degree of technical expertise. India is fighting off an array of disruptive attacks that include...