Zephyrnet Logo

Tag: remote access

Enabling Business Continuity in an Uncertain Global Environment

Today’s uncertain global environment has made it an imperative for companies to enable remote access to business-critical applications. In particular, the fluidity...

Threat Awareness: A Critical First Step in Detecting Adversaries

One thing seems certain: Attackers are only getting more devious and lethal. Expect to see more advanced attacks. We're in an arms race...

Keeping Systems Safe From Third Parties

Vendors. Supply chain partners. Third parties. Contractors. All are different names for entities that might need access to your corporate networks and...

Customer Success: DrugPatentWatch for Your Library

Listen to this articleOne of our clients, the Belarus Republican Scientific and Technical Library recently posted an article on how they support innovation.They...

MIT researchers identify security vulnerabilities in voting app

In recent years, there has been a growing interest in using internet and mobile technology to increase access to the...

Whoooooa, this node is on fire! Forget Ceph, try the forgotten OpenStack storage release ‘Crispy’

On Call Friday has arrived once again with a tale from the smouldering world of On Call. Today's remembrance comes from "Phil", who...

Top 15 Cybersecurity Trends for 2019

Moving into the fourth quarter of 2019, it’s a great time to reflect on the current cybersecurity landscape and the major events and trends which have happened this year. Almost everybody understands what cybersecurity means in the most basic sense, as the majority at least have some experience with anti-virus software. But as we increasingly […]

Top 15 Cybersecurity Trends for 2019 was originally found on Blokt - Privacy, Tech, Bitcoin, Blockchain & Cryptocurrency.

CyberSecurity Doesn’t Get a Vacation: Three Tips for (Secure) Fun in the Sun

Reading Time: 3 minutesFor millions of Americans, the Fourth of July means fireworks, picnics and barbecues, and the chance to take...

Endpoint Security Glossary

Reading Time: 9 minutesHere’s an A to Z glossary of terms related to Endpoint Protection- A Advanced Persistent Threat (APT) – An unauthorized person gaining...

Comodo One. Takeover remote endpoints using ITSM

Reading Time: 6 minutesTakeover remote endpoints using ITSM ITSM’s ‘Takeover’ feature allows administrators to remotely access and control Windows devices to solve issues, install...

Warning! RATS Attacking Mobile Devices

Reading Time: 3 minutesUpdate: check the latest version of Comodo’s free mobile security app When it comes to securing a digital device, antivirus is...

Security Flaw Reported in Samsung Galaxy Androids

Reading Time: 2 minutesUpdate: check the latest version of Comodo’s free mobile security app Developers of Replicant, an open source variant of Android, claim...

Latest Intelligence

spot_img
spot_img