The COVID-19 pandemic has led governments around the world to require citizens to stay at home for an undetermined duration, likely several months. This is incredibly disruptive to economic activity. Where possible, employers have asked their workers to continue to work, but remotely. But this transition can be taxing...
59% of people mostly or always use the same password. 47% OF people say there's no difference in the passwords they use for work and home. 42% of people keep passwords in an unprotected file. These statistics point to one glaring question - are passwords alone enough to protect against the evolution of sophisticated...
This survey is currently closed. Thank you.
Today, organizations have many different types of users (identities) accessing their data ranging from employees, non-employees, contractors, bots, and even cloud-based workloads. These same organizations run and support hundreds of applications in their environment, on a...
Over the years, there's been an alarming increase in the number of passwords the average person must remember. While cloud apps, mobile apps, and any number of new technologies have brought many positive changes to the workplace, they've also introduced a plethora of passwords that employees struggle to keep track of....
DivvyCloud surveyed nearly 2,000 IT professionals throughout the 2019 calendar year to better understand how enterprises are adopting public cloud, multi-cloud, containers, and other services, as well as the challenges they experience in maintaining security and compliance. The DivvyCloud 2020 State of Enterprise...
The threat landscape is evolving constantly; attackers are refining their strategies and increasing both the volume and complexity of their attacks. Enterprises now are having to defend against everyday cybercriminal attacks as well as targeted attacks and even the rare advanced persistent threats (APTs).
Download...
DevOps and the CI/CD pipeline are revolutionizing application development, test, and cloud delivery, enabling developers to write the application code and define the cloud infrastructure. But this has left many cloud security teams relying on "runtime" security.
Read this guide to learn:
The four primary DevOps...
The process of onboarding vendors has become complicated because of concerns about cybersecurity. To prevent data breaches caused by a third party vendor, security professionals demand that vendors demonstrate and maintain a strong cyber posture.
Effectively checking vendors' cyber posture can be extremely...
Federal government agencies face unique cybersecurity risks, and as a result they often place tight restrictions on mobile devices in the workplace. But perhaps it's time to loosen these restrictions because they are negatively impacting missions, recruitment and retention.
There are consequences of cutting back or...
Mobility and digital transformation have forced enterprises to radically rethink their security strategies - particularly in new multi-cloud environments.
Download this eBook and learn:
How mobility and digital transformation have influenced security strategies;
The future of secure web gateways;
Amidst change,...
Security professionals have long struggled to demonstrate the return on investment of their security spend.
Getting sign off for an insider threat program is no different. Advanced analytics and user and entity behavior analytics (UEBA) solutions enhance the security posture of organizations deploying them....
According to ESG research, almost two thirds (63%) of organizations say that cybersecurity analytics and operations is more difficult today than it was two years ago.
This report examines Securonix Security Operations & Analytics Platform with a focus on:
How the platform efficiently and effectively provides...
It's crucial for companies to assess and monitor the security of their vendors, suppliers and business partners.
Companies must carefully check their vendors' cyber posture, and the initial vetting of any third party typically begins with a comprehensive security questionnaire. But these can be a headache, because...
We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. But this particular supply chain attack was an attack on a service provider.
Download this case study to learn how to quickly mitigate third-party security risks.
A year in cybersecurity is marked by how disruptive the activity observed was - not just from a destructive standpoint, but also from the perspective of how day-to-day life was affected across major industries. The 2020 CrowdStrike Global Threat Report offers one of the industry's most comprehensive reports on today's...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.