remote working
![SASE](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/02084438/sase-400x200.jpg)
What is the true meaning of SASE?
The adoption of SASE has skyrocketed during the pandemic, according to a research conducted by Sapio Research. Thirty-four percent of businesses claim to already be adopting …
![remote work](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/02105608/remote_work2-400x200.jpg)
Flexible work is the new operating model
As flexible work is increasingly viewed as an expectation for the working world, attitudes continue to vary widely across industries, roles and geographies, a Fuze study …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/18191201/vault-bkg-400x200.jpg)
How to secure data one firewall at a time
The need for secure data access management is top-of-mind in the C-suite and boardroom. The question I keep hearing from IT departments is how to do it right, that is, how to …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100640/cloud-400x200.jpg)
Understanding the cloud shared responsibility model
Over the past year, we witnessed a transition to the cloud as companies had to quickly adjust to the almost instantaneous move to a remote work environment. But in many cases, …
![remote workforce protection](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/08091029/remote_workforce_protection2-400x200.jpg)
Corporate attack surfaces growing concurrently with a dispersed workforce
Zscaler released a report on the state of corporate attack surfaces. Based on data sourced between February 2020 and April 2021, the report provides a first-ever look at the …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093630/identity_theft2-400x200.jpg)
Identity management is now mostly about security
IDSA released a study based on an online survey of over 500 IT decision makers. The report examines the impact that the pandemic and increase in remote work had on identity …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100013/user-400x200.jpg)
Bad cybersecurity behaviors plaguing the remote workforce
A report from Tessian reveals that 56% of IT leaders believe their employees have picked up bad cybersecurity behaviors since working from home. As organizations make plans …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Why XSS is still an XXL issue in 2021
Cross-site scripting (XSS) attacks take advantage of coding flaws in the way websites or web applications generate input from users. Despite their longstanding reputation as a …
![attacks](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27135755/attacks-fire-400x200.jpg)
VPN attacks up nearly 2000% as companies embrace a hybrid workplace
Nuspire released a report which outlines new cybercriminal activity and tactics, techniques and procedures (TTPs) with additional insight from Recorded Future. “As companies …
![cloud money](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093749/cloud-money1-400x200.jpg)
Cloud computing costs skyrocketing as businesses support a remote workforce
Anodot announced the results of a survey that reveals how organizations struggle to control skyrocketing cloud computing costs of the remote workforce, even as business moves …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
Investing in the right future for the cloud
In the last decade we have seen cloud technology evolve from a useful competitive business tool to one of the key foundations of the business world. Migrating assets, …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105254/ddos_attacks-400x200.jpg)
DDoS attacks increase 341% amid pandemic
During the pandemic, cyber attackers targeted industries providing connectivity, services and entertainment to populations forced to shelter-in-place, resulting in a 341% …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD