Zephyrnet Logo

Tag: BYOD

TikTok Banned on Govt. Devices; Will Private Sector Follow Suit?

Texas this week become the fifth US state to ban the TikTok app on government-owned devices over concerns about the social media app harvesting...

Cyber Security Options for Supply Chain!

Technology has mainly driven the growth of supply chain operations throughout the years. Organizations of all sizes are migrating to the digital world,...

Will New CISA Guidelines Help Bolster Cyber Defenses?

Do you know what IT devices are in your business or on your network right now? If not, you may have cybercriminals and the...

Forcepoint SASE solution blends ONE platform, SD-WAN to advance data security offerings

Austin, United States – Global security provider Forcepoint is now offering a single-vendor secure access service edge (SASE) solution. With the Forcepoint ONE Security Service Edge (SSE) platform...

Top Use Cases of Virtual Private Gateways

A virtual private gateway is a networking device that joins two or more networks or devices in a VPN system. It is intended to...

Protecting Critical IP With Next-Generation Zero Trust Security

While semiconductors are the enablers for high-tech solutions, the semiconductor industry was not at the forefront of Cloud adoption. There were many valid concerns...

CISO Checklist for Offboarding Security Staff

The Great Resignation strikes cybersecurity teams too. Here's a checklist for CISOs to ensure security is retained even as security staff is not.

Network Security Firm Portnox Raises $22 Million in Series A Funding

Cloud-native network and endpoint security solutions provider Portnox on Thursday announced raising $22 million in a Series A funding round.

read more

Hackers Using Device Registration Trick to Attack Enterprises with Lateral Phishing

Microsoft has disclosed details of a large-scale, multi-phase phishing campaign that uses stolen credentials to register devices on a victim's network to further propagate spam emails and widen the infection pool. The tech giant said the attacks manifested through accounts that were not secured using multi-factor authentication (MFA), thereby making it possible for the adversary to take

Security Service Edge: 4 Core Tenets for Your SASE Journey

Historically we've held network conversations to address security problems, but that doesn't work in a cloud-based world.

Worst Data Security Threats Remote Workers Can’t Ignore

Data security is becoming a greater concern for companies all over the world. The pandemic has contributed to these issues. A number of hackers started targeting companies for data breaches during the pandemic, partly because so many employees were working remotely. The frequency of data breaches is not likely to subside anytime soon. Many companies […]

The post Worst Data Security Threats Remote Workers Can’t Ignore appeared first on SmartData Collective.

ZTNAs Address Requirements VPNs Cannot. Here’s Why.

I recently hopped on the Lookout podcast to talk about virtual private networks (VPNs) and how they've been extended beyond their original use case of connecting remote laptops to your corporate network. Even in this new world where people are using personal devices and cloud apps, VPN continues to be the go-to solution for remote access and cloud access. After my conversation with Hank Schless,

Latest Intelligence

spot_img
spot_img