Register for the Dec 8 RSA Evolution of Identity Summit

The RSA Evolution of Identity Summit will convene thought leaders from across the sector to discuss challenges around cloud and remote workforce security, trends such as Zero Trust, passwordless authentication, and the ...

Connectivity Counts: Why Smaller FSIs Worry about Secure, Remote Access

Nimble but Smaller FSIs Adapt to Change Quickly, but Have Fewer Resources  Not every financial service institution (FSI) is the size of a global bank with hundreds of thousands of workers. Frequently, boutique ...

3 Zones that Require Network Security for Industrial Remote Access

By now, we have a good understanding of what secure remote access (SRA) is and why organizations might choose to enable it for their OT environments. We also know that securing IT-OT ...
HashiCorp

HashiCorp Launches Open Source Identity Framework

HashiCorp, at its HashiConf Digital conference today, announced an open source Boundary project that will enable users to remotely access systems regardless of location based on their specific identity. At the same ...
Security Boulevard
Logix CISO on Remote Workforce Security Strategies

How Remote Work is Reshuffling Your Security Priorities and Investments

Roughly five months into the pandemic, stark stories of unsustainability have emerged, from personal debt caused by months-long unemployment to... The post How Remote Work is Reshuffling Your Security Priorities and Investments ...

Secure Remote Access: Why It’s Important and How to Do It Right

COVID-19 forced organizations all over the world to transition their employees to a work-from-home policy. That change came at a time when organizations’ connected infrastructure is more complex than ever. Such complexity ...

Is Your Short-Term Remote Workforce Technology in for the Long-Haul?

The dynamic, distributed workforce is not a passing phase. It is here to say. Thus, it?s time to consider what is required for best-in-class security in this new reality of working from ...

Mitigating Threats Associated with Downloading Files in Native File Format

File-based threats are occurring with greater frequency and higher success rates as threat actors have continued to hone and adapt their social engineering and spearphishing skills to fit today’s trends, such as ...
brute-force

Remote Work Pushes Brute-Force Attacks Higher

The widespread switch to work-from-home arrangements around the globe means employees are working offsite at unprecedented levels. It’s also prompted cybercriminals to find additional targets to exploit. We have heard for months ...
Security Boulevard
data secure

4 Ways to Keep Company Data Secure During WFH

Military personnel talk about how dangerous life can be outside the wire. But what about your organization’s employees working from home—from outside the wall, as it were—during the coronavirus pandemic? Your employees ...
Security Boulevard