A global health crisis. A remote workforce. Economic uncertainty. These are key ingredients to fuel the insider threat. Randy Trzeciak of the CERT Insider Threat Center at Carnegie Mellon University offers tips for monitoring risky behavior and creating positive incentives to reduce risk.
Using location data to warn people who have come in contact with those infected with COVID-19 holds promise to stem the deadly pandemic. But with that comes privacy concerns. Cryptologist Vanessa Teague breaks down risks and solutions.
The shift to telework due to the global COVID-19 pandemic has raised the risk of exposure to botnets as well as Mirai and Trickbot malware, according to the security firm BitSight.
A month-plus into pandemic response, what have enterprises learned from deploying and securing a nearly fully-remote workforce? Thomas Bieser of Okta shares lessons and the benefits of accessing critical apps and tools via the cloud.
Before the COVID-19 pandemic, venture capitalist Hank Thomas helped launch SCVX, a cybersecurity-focused special purpose acquisition company. Post-pandemic, Thomas sees a bright future in filling what he sees as the market need for a scalable, integrated platform.
In the effort to develop COVID-19 medical insights, some healthcare and technology firms are reportedly partnering to collect coronavirus patient information to assist government and academic researchers. But such efforts are raising significant security and privacy concerns.
The U.K. government says it's prepping a contact-tracing app in an attempt to help contain COVID-19. But a leading cybersecurity expert argues that the proposal amounts to little more than "do-something-itis" and urges a focus, instead, on expanded testing as well as ventilator production.
In this webinar, Mark Sangster discusses how the COVID-19 crisis is affecting businesses and individuals and the need to stay vigilant. Emerging threats from bad actors who are taking advantage of the COVID-19 crisis are inevitable. Distributed workforces are leaving gaps in our defenses and opening the door to...
To ensure business continuity, companies that support India's critical infrastructure need to validate the functioning of the security controls and other tools deployed to support the remote workforce during the COVID-19 pandemic, says Mumbai-based Shivkumar Pandey, group CISO at the Bombay Stock Exchange.
Privileged access management is more critical as a result of the shift to telework during the COVID-19 pandemic and the ongoing movement of applications and data to the cloud, says Dr. Yask Sharma, CISO of a large national critical infrastructure organization in India, who outlines essential PAM components.
As telework has become the norm during the COVID-19 pandemic, ensuring new security issues arising from the use of shadow IT are addressed has become a more critical issue. Subhajit Deb, CISO at Dr. Reddy's Laboratories, offers insights on maintaining visibility so shadow IT can be better managed.
The COVID-19 pandemic has dramatically changed how we live and work - for now. But will some of these changes last beyond the crisis? If so, what impact can we expect on cybersecurity and privacy? Thought leaders Edna Conway of Microsoft, Michelle Dennedy of DrumWave and Wendy Nather of Cisco share their views.
Researchers at Boston University have written a research paper that proposes creating a smartphone app that uses short-range transmission technologies that can inform users if they have been in close proximity to a person infected with COVID-19 - while maintaining privacy.
As global enterprises get their arms around supporting and securing a near-total remote workforce, their digital adversaries are adapting - and so is the role of deception technology. Carolyn Crandall of Attivo Networks discusses how deception can help mitigate new risks.
A recently uncovered spear-phishing campaign is using fears of the COVID-19 pandemic to spread an information stealer called LokiBot. FortiGuard Labs researchers find that cybercriminals are once again using World Health Organization images as a lure.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.