You Searched For "cybersecurity briefing" and got 20 results
Sort By:
With today's hybrid workforce, protecting corporate data on mobile devices is essential for companies
With data residing on a range of mobile devices, companies of all sizes must find ways to identify …
Stephen Lawton
Cyberattacks still threaten home networks, two years after the COVID-19 pandemic spurred the work-from-home boom
Organizations have been wrestling with WFH cybersecurity issues for more than two years, but cybera…
Stephen Lawton
Why SASE — an emerging cybersecurity term — is crucial for protecting your company's work-from-home data and systems
Coined in 2019 by research company Gartner, SASE is a security architecture that is the core compon…
Stephen Lawton
How the zero-trust cybersecurity model of 'trust nothing, verify everything' is key to a remote-first work environment
As the cybersecurity world adapts to remote work, zero trust allows companies to identify, validate…
Stephen Lawton
The shift to remote work created a new model for cybersecurity. Here are tactics companies can use to protect their work-from-home employees.
As a result of the pandemic, companies are changing their cybersecurity tactics to better protect b…
Stephen Lawton
What to know about the growing threat of ransomware attacks and their impact on companies of all sizes
As ransomware attacks become more aggressive and common, companies must reevaluate their cybersecur…
Stephen Lawton
How tackling cybersecurity training from a companywide lens leads to better preparedness
Cybersecurity experts recommend a hybrid approach when training for cyberattacks, including company…
Stephen Lawton
By identifying and halting incoming cyberattacks, threat intelligence can give companies - and their data - the upper hand
To stop a cyberattack, it's important to look at the identification process, or threat intelligence…
Stephen Lawton
Cyberattacks threaten the corporate world. Here's what companies need to know about what comes next.
Cyberattacks threaten reputation, mergers and acquisitions, corporate valuation, the ability to rai…
Stephen Lawton
A closer look at the changing landscape of cyberattacks and what they mean for worldwide security
Given Biden's recent executive order, the changing landscape of cyberattacks makes it imperative fo…
Stephen Lawton
Hackers infiltrated Israeli smart billboards to post pro-Hamas messages, reports say
Two billboards near Tel Aviv were hijacked for a brief period on Thursday, the boss of a cybersecur…
Tom Carter
China hacked Japan's sensitive defence networks, says report
As per The Washington Post, three former senior US officials, who was among a dozen current and for…
ANI
A man who runs the web domain for a Russian-allied country says he's been accidentally sent millions of US military emails for 10 years, including sensitive information like a general's travel itinerary
Johannes Zuurbier, who ran Mali's email domain for 10 years, says he's received emails containing m…
Matthew Loh
The FBI says the US government is being subjected to 'a significant and ongoing' cyberattack
Sen. Richard Blumenthal said Russia's Cozy Bear hackers are behind a cyberattack on Washington, whi…
Kevin Shalvey
Surprise resort trips and empty hotel rooms reveal how Russia's plan for an easy victory in Ukraine fell apart
Russian leaders assumed their plan to undermine the Ukrainian government would work, and they forge…
Stavros Atlamazoglou
Chris Christie says 'not much was accomplished' during Biden's trip to Europe, but 'no damage was done'
"In the end, not much was accomplished, but no damage was done," Christie said. "That's probably al…
John L. Dorman
A guide to proxy servers, the computer systems that relay information between users and networks, and how they can disguise users' online presence
A proxy server is an intermediate gateway that you can use to exchange information with internet re…
Dave Johnson
A guide to two-factor authentication, the two-part security test for your online accounts and devices
Two-factor authentication is a security measure that makes you pass two security tests before gaini…
Melanie Weir
At least 30,000 US organizations, small businesses and government offices were victims of Microsoft Exchange hack: Krebs
A purported Chinese hacking group exploited bugs in Microsoft's email software system to steal data…
Fatma Khaled
Amazon said it skipped a Congressional hearing about the SolarWinds hack because the e-commerce giant doesn't use the company's software
Amazon said it declined to attend a SolarWinds hearing because it was "not compromised in any way,"…