Left to their own devices: Security for employees using personal devices for work

As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD security won’t cut it. Since it helped organizations ride out the disruption wrought by the pandemic, remote work (that later often morphed into hybrid work) has cemented its staying power. With the boundaries between work and home becoming blurrier than ever, many … More Left to their own devices: Security for employees using personal devices for work

What is the Zero Trust security model, and why is its adoption growing?

Zero Trust promotes the concept that organizations should not trust any entity inside or outside their network perimeters in a predetermined fashion. Adoption of the Zero Trust security model is picking up steam at last. In February 2020 – before the pandemic swept the world – a survey of more than 400 IT security decision makers conducted … More What is the Zero Trust security model, and why is its adoption growing?

What happens when the global supply chain breaks?

If we can’t secure the supply chain, eventually everything else will break. Recent events have illustrated the need for robust continuity plans, and while these events are still unfolding, it also brings to light the need for robust supply chain planning. A review of the r/sysadmin group on Reddit reveals comments from systems administrators that their orders … More What happens when the global supply chain breaks?

Defending your company from cyberattack

ESET CTO Juraj Malcho outlines some of the ways in which organizations can reduce their cybersecurity risk. Given our growing digital dependency, cybersecurity incidents and the exploitation of security soft spots can have serious and cascading ramifications for businesses and their customers. Recent history has seen no shortage of high-profile cyberattacks and data breaches, giving … More Defending your company from cyberattack