Just when we needed it most, the internet of things is delivering gobs of data and remote device control across almost every industry, from healthcare to agriculture.
Companies now have the opportunity to learn from what is and isn’t working during the coronavirus crisis. Use this time to build out a strategy so you won’t have to use band aids and duct tape next time.
Future generations will judge our response to the COVID-19 pandemic not only by our real-time public health and economic actions, but also by our post-pandemic regulatory choices. One of these choices will be how Congress should address the data privacy question, which is rising to new prominence as we embrace the notion that tech and…Details
I recently interviewed several CSOs and CISOs from the financial services, tech, healthcare, media and other industries to see how they were managing through these turbulent times. Below are the questions I asked them and a summary of their collective wisdom and best practices. While I would love to give these experts all the credit…Details
Suddenly countless numbers of people are working from home. This massive shift in work processes can have huge repercussions from a security, privacy, regulatory and data governance standpoint.
A crisis on the scale of the one we’re facing demands decisive action. Luckily for many IT leaders, the first move was easy: When COVID-19 work-from-home mandates hit, those with the right policies and infrastructure in place endured the massive shift to remote work with minimal disruption. Add VPN capacity, videoconferencing, and a healthy dose…Details
Insider Pro and CertsNexus have created a virtual classroom where subscribers can learn and test their cybersecurity readiness.
Congratulations. You’re now the chief security officer of your company’s newest branch office: Your home. Here’s how to manage your new job.
Most phishing campaigns use links to malicious scripts that infect users’ devices. Here’s how to spot and prevent them from doing damage.
Use these tools and techniques to protect important data from being exfiltrated from your Windows network.