A sophisticated, highly targeted phishing campaign has hit high-level executives at more than 150 businesses, stealing confidential documents and contact lists, says security firm Group-IB. The campaign, which targets Office 365 users, appears to trace to attackers operating from Nigeria and South Africa.
Customers are turning to the cloud to reduce capital expenses and increase agility
as part of their digital innovation (DI) initiatives. Despite the benefits, cloud migration
results in business-critical data and services being scattered across clouds and data
centers. This leads to an expanded attack surface and a...
Many governments are pursuing contact-tracing apps to combat COVID-19, but such projects risk subjecting populations to invasive, long-term surveillance - as well as insufficient adoption - unless they take an open, transparent and as decentralized approach, says cybersecurity expert Alan Woodward.
Enterprises long have practiced workforce identity and access management, but increasingly they are rolling out customer IAM, or CIAM. What's driving the trend, and where should cybersecurity leaders look to assert influence? Keith Casey of Okta explores some CIAM myths and realities.
A month-plus into pandemic response, what have enterprises learned from deploying and securing a nearly fully-remote workforce? Thomas Bieser of Okta shares lessons and the benefits of accessing critical apps and tools via the cloud.
Privileged access management is more critical as a result of the shift to telework during the COVID-19 pandemic and the ongoing movement of applications and data to the cloud, says Dr. Yask Sharma, CISO of a large national critical infrastructure organization in India, who outlines essential PAM components.
Organizations across the world struggle with numerous IT monitoring challenges - hybrid environments, lack of visibility during cloud migration, multiple monitoring tools, reliance on manual processes and more. Yet according to a 2018 global survey, less than half of IT practitioners are confident they can ensure...
All businesses ensure that their cloud adoption doesn't outpace their security capabilities.
Download this white paper and use it as a guide through these three phases of secure cloud adoption:
Prioritizing accessibility;
Enabling cloud access;
Adding all users and eliminating local networks.
To ensure business continuity, manufacturers in India that now have a 100 percent remote workforce because of the COVID-19 pandemic must be vigilant about ensuring critical data is protected through continuous monitoring, says Ravikiran S. Avvaru of the manufacturing group Apollo Tyres Ltd.
Security practitioners around the world are struggling to cope with the challenges posed by remote workers heavily relying on virtual private networks during the COVID-19 pandemic. Here's a look at steps to take to help enhance security.
At a time when individuals are accessing information in the cloud from anywhere, it's important to establish trust with the user, says Brijesh Miglani of Forcepoint.
When it comes to cloud environments, whether in the public cloud or a privately hosted or hybrid environment, data security and protection controls must protect sensitive data - and support constantly growing government and industry compliance requirements.
Read this ebook to learn how data security and...
At a time when cybersecurity leaders are managing business resiliency with the world's largest remote workforce, how can enterprises remain both dynamic and grounded in fundamental security controls? Christopher Kloes of Unisys discusses this challenge.
Organizations struggle with numerous IT monitoring challenges - hybrid environments, lack of visibility during cloud migration, multiple monitoring tools, reliance on manual processes and more. Yet, less than half of IT practitioners are confident they can ensure performance and system availability with their current...
The world of ephemeral computing using the cloud, containers, and Kubernetes continues to evolve in ways that are both innovative and challenging. Change happens so fast it's hard for Security and GRC professionals to keep up. Organizations need to take a holistic approach to Kubernetes security and consider both the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.