WFH risk

How to Manage WFH Risks Through COVID-19 and Beyond

Work from home (WFH) brings many benefits to organizations, but it creates risks by virtually inviting cyberattacks along multiple vectors. This is NOT a call to stop WFH. It is a caution ...
Security Boulevard

Cloud Breaches to Become Faster and Bigger, Research Suggests

Cloud breaches continue to riddle organizations’ threat landscape, with misconfigured cloud storage services and poor security practices leading to more than 200 breaches in the past two years, according to the latest ...
261310-800x450-woman_working_home

Securing Any App With Bitglass

The rise of the cloud has enabled organizations’ employees to perform their work duties in any location and from a multitude of devices. Now more than ever, employees are accessing a plethora ...

Use of High-Risk Apps and Websites Increased 161% Amid Work-from-Home Shift, New Research Shows

The August 2020 edition of the Netskope Cloud and Threat Report highlights a 161% increase in visits to high-risk apps and sites brought on by a 64% remote workforce ...

Insurance CISO Concerns With Cloud Migration

With digital transformation a term most will be familiar with now, we could say with some certainty that many industries have either already adopted or are in the process of migrating to ...

“Easy Wins” When Securing Slack

In 2019, Slack reached the 12 million daily user mark, which is likely even higher today as the remote workforce has surged, making the tool a foundational part of corporate and enterprise ...
eLearning Inside | K-12 Hybrid Learning and Why District IT Teams Must Take a Cloud-First Approach

eLearning Inside | K-12 Hybrid Learning and Why District IT Teams Must Take a Cloud-First Approach

by ManagedMethods CEO Charlie Sander, for eLearning Inside When K-12 schools closed their buildings at the start of the COVID-19 pandemic, IT departments’ cybersecurity plans were flipped inside out. Districts went from ...
cloud security

Report Finds Cloud Security Concerns Warranted

A recent report published by Orca Security, a provider of tools for scanning cloud workloads, suggests the shared responsibility approach to cloud security is not being embraced as successfully as most organizations ...
Security Boulevard
Protecting AWS Assets: A Case Study

Protecting AWS Assets: A Case Study

Cloud environments make it easy to deploy new resources and grant wide-ranging permissions that can eventually be abused. The post Protecting AWS Assets: A Case Study appeared first on Radware Blog ...
Qualys cloud

Qualys Extends Cloud Reach Into EDR Realm

Qualys today launched an Endpoint Detection and Response (EDR) cloud service, while at the same time revealing it has acquired the software assets of Spell Security to improve the quality of the ...
Security Boulevard