It's no exaggeration to say that, in the midst of the COVID-19 pandemic, we now have the largest-ever global remote workforce. And with it comes an expanded attack surface that requires extra attention. Phil Reitinger of the Global Cyber Alliance shares five tips for securing the remote workforce.
The COVID-19 pandemic present new challenges to healthcare IT and security teams, including the need to reassess and adjust business continuity plans, says Christopher Frenz, who leads information security at New York's Interfaith Medical Center. He's chair of an industry committee that developed guidance.
In cybersecurity circles, multi-factor authentication today is considered table stakes. Yet, many organizations and users are hesitant to embrace MFA because of friction or other concerns. Corey Nachreiner and Marc Laliberte of WatchGuard Technologies dispel some of the MFA myths.
Nation-state hackers as well as cybercriminals are now attempting to use phishing emails with themes tied to the global COVID-19 pandemic to spread malware, according to recent security reports.
Europol, along with local police in Spain, Romania and Austria, arrested about two dozen alleged members of two criminal gangs that are accused of stealing millions in euros from bank accounts in several countries by using SIM swapping techniques to steal credentials and passwords.
As the COVID-19 pandemic intensifies, public health efforts are being complicated by ransomware attacks continuing to hit healthcare facilities that are not only handling cases but also running frontline virus-testing labs.
Automated workflows can help pre-emptively report cybersecurity risks to the board and allow for better qualitative approaches to interpreting data, says Ben de Bont, CISO of ServiceNow.
Growing data sources and intel feeds are making it more challenging for security teams to find the signal in a very noisy landscape, says Neustar's Brian McCann.
As businesses face pressure to release software faster, security is unfortunately not keeping pace, says Anthony Bettini of WhiteHat Security, who reviews DevSecOps challenges.
A network-based approach to visibility can succeed in providing critical insights, while node-based approaches may hit bottlenecks, says Lastline's Giovanni Vigna.
Triaging growing volumes of SOC telemetry is becoming increasingly untenable for security teams, says Cysiv CEO Partha Panda, who makes the case for SOC-as-a-Service offerings.
President Donald Trump has signed legislation that bans telecommunication firms from using federal funds to buy equipment from companies that are deemed a "national security threat" and provides funding for "rip and replace." The measure takes aim at Chinese firms Huawei and ZTE.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.