NAGRA NexGuard Forensic Watermarking Integrates With AWS (HITS)

Content protection and multiscreen TV solutions firm NAGRA has announced API integration of its NexGuard forensic watermarking technologies into Elemental MediaConvert, the file-ba... More

Untrained and Malicious Users Lead IT Team Concerns (IT Pro Portal)

If there's one thing that keeps IT pros awake at night, it's untrained staff using shadow devices and apps.... More

Changes Set to Impact CISOs in a Post-Pandemic World (Forbes)

Currently, many CISOs are working remotely and leading security programs as they assist IT teams who are caring for employees that have transitioned from an office environment to o... More

Why Securing Endpoints is the Future of Cybersecurity (Forbes)

Verizon’s DBIR reflects the stark reality that organized crime-funded cybercriminals are relentless in searching out unprotected endpoints and exploiting them for financial gain,... More

Antivirus, Firewalls Top Security Solutions for Remote Work (CIO Dive)

Companies using a hybrid model of physical and virtual solutions chose favorites in a hurry this year. The rapid leap to cloud-based solutions reaffirmed the technology's necessity... More

Video Conferencing Security for Businesses Isn’t a New Issue, It Just Came Into Focus (Security Intelligence)

With 316 million Americans being asked to stay at home during the COVID-19 pandemic and nearly half of the U.S. population still working from home, video conferencing has suddenly ... More

Stronger Together: Building Cyber Resilience (Security Intelligence)

In January, the World Economic Forum again included cyberattacks as one of the top 10 most likely and significant risks to society in 2020. Less than two months later, ways of work... More

What the Data is Telling Us About the Current Rise in Security Threats During the COVID-19 Pandemic (Security Intelligence)

The current pandemic has shown us what humanity stands for: kindness, care, sharing, giving and all the great values that we have as a global community, especially in hard times. I... More

Akamai to Help Combat Credit Card Skimming, Sophisticated Magecart-Style Attacks With Page Integrity Manager (HITS)

Akamai announced the launch of Page Integrity Manager, an in-browser threat detection solution designed to uncover compromised scripts that could be used to steal user data or impa... More

Akamai Helping Remote Workers Secure Access to Apps for Business Productivity (DataQuest)

Akamai’s Business Continuity Assistance Program, armed with our enterprise security solutions, can be globally deployed in less than 15 minutes to secure and manage remote access... More

Support Remote Workforce Productivity With Secure Cloud Services (Security Intelligence)

The goal for your security team is to enable a seamless shift in work environments for employees and to ensure secure operations for your business no matter where users are located... More

Does Your Security Awareness and Training Program Account for Changing Work Environments? (Security Intelligence)

As businesses transition to remote work and many employees adjust to working from home, organizations need to stay focused on people-centric security. People-centric security place... More

How to Maintain Security When Employees Work Remotely: 4 Common Challenges (Enterprisers Project)

Security fundamentals still apply. But your previous definition of human error probably didn't account for an employee helping kids navigate distance learning, checking on a vulner... More

Legacy Technology Could Prove a Problem for Remote Working (Forbes)

Business continuity plans are being put to the test as organizations close their physical locations and enforce a rigid work from home policy. IT professionals have been forced to ... More

Legacy Technology Could Prove a Problem for Remote Working (Forbes)

Business continuity plans are being put to the test as organizations close their physical locations and enforce a rigid work from home policy. IT professionals have been forced to ... More

Defragging Security With a Platform Approach (Security Intelligence)

Cybersecurity leaders and security teams are going through a tough phase. On one hand, cyberattacks are at an all-time high with 8.5 billion records breached in 2019 and ransomware... More

The 10 Rules of BYOD: Rewritten (Forbes)

We are in an era where a personal device as a work tool is not just accepted but essential to support remote work. Simply providing email, calendaring, and a handful of administrat... More

Context-Driven Digital Trust: A New Security Paradigm For Hybrid Multicloud Organizations (Forbes)

Today’s connected culture expects to interact with businesses digitally, with immediacy and privacy. For companies to remain competitive in this hyper-connected world, they need ... More

Is the CIO’s Focus on Cybersecurity Stalling Innovation? (Tech HQ)

Digital innovation and cybersecurity are intertwined – attention shouldn't be paid to one without considering the other. ... More

Grow Your Business With an Evolving Cloud Security Strategy (Security Intelligence)

We have all heard the castle-and-moat analogy to describe traditional centralized approaches to cybersecurity. As cloud security becomes increasingly important in the modern landsc... More