There's been a huge shift to remote working this year, but new data shows that there has also been a 161 percent increase in visits to high-risk apps and websites as personal use of managed devices has nearly doubled.
The study from cloud security company Netskope finds that 64 percent of workers are now remote. Along with this increase in remote work has come an 80 percent increase in the use of collaboration apps as remote workers seek to remain connected with their colleagues
We've already seen how lockdowns have been affecting internet speeds around the world, but what other impact has the pandemic been having on the web?
A new Internet Performance Report from ThousandEyes looks at the availability and performance of internet-related networks, including those of Internet Service Providers (ISPs), public cloud, Content Delivery Network (CDN) and Domain Name System (DNS) providers.
Digital transformation combined with a shift to more remote working has presented considerable challenges for enterprises when it comes to securing their systems.
One of the technologies being increasingly used to enable remote access is Secure Access Services Edge (SASE). We spoke to Anurag Kahol, CTO and co-founder of cloud security company Bitglass to find out more about SASE and how it can help businesses deliver their transformation projects.
As more organizations move their operations to the cloud and networks become more fragmented, ensuring safe, secure access to systems becomes more difficult.
Secure access specialist Pulse Secure is launching a new Pulse Zero Trust Access (PZTA) solution. A cloud-based, multi-tenant secure access platform that enables organizations to provide users with easy, anywhere access to multi-cloud and data center applications.
Secure Access Service Edge (SASE) technology is increasingly being used to enable secure and fast cloud adoption, helping ensure both users and devices have safe cloud access to applications, data and services from anywhere.
Cybersecurity company Forcepoint is entering this market with a new suite of SASE solutions, including a Cloud Security Gateway and zero trust Private Access features.
Faced with an ever changing landscape, skills shortages and budget constraints, IT departments are increasingly seeking to automate repetitive tasks.
Automation specialist BitTitan is looking to capitalize on this with the launch of an IT toolbox designed to centralize and automate IT tasks for more effective management of resources, security and data governance.
There is an old saying that there are no perfect solutions, only trade-offs. We have all experienced this trade-off situation in our lives at some point, when we must make a decision knowing that there is no perfect solution available and that we will be forced to compromise in some way.
This is one of the reasons why some people choose to put money in the stock market, they’re prepared to take a risk, while some people prefer to put money in savings accounts, where the payback is more predictable. The trade-off in this example is that you cannot put the same money in both places at the same time. You need to make your decision based on the existing trade-off of higher risk and return (stocks) or lower risk and return (savings account).
Organizations often rush into cloud deployments without fully appreciating all of the risks that they can present.
A new report from cybersecurity advisory and assessment services firm Coalfire identifies key considerations, common pitfalls, and practical advice for professionals who have responsibility for enterprise cloud strategy, planning, adoption, and operations.
Using complex cloud applications built with microservices and APIs can often expose business logic that threat actors use to infiltrate applications and private data.
A new application security company Traceable is launching today with a platform that traces end-to-end application activity from the user and session all the way through the application code. Traceable's TraceAI machine learning and distributed tracing technology analyzes data to learn normal application behavior and detect any activity that deviates from the norm.
While OneDrive is primarily used for cloud file storage, it also includes a handy feature that lets you remotely access any of the files stored on your PC. Or at least this is the case for the next couple of weeks.
When the end of July rolls around, Microsoft is killing off the ability to "fetch files" from a connected computer. Instead, users will have to explicitly specify which files and folders they want to synchronize and be able to access.
As companies accelerate their digital transformation programs, many move data into the cloud without all the security controls necessary to protect both their organization and customers’ data. This leaves them vulnerable to cyberattacks and without evidence of compliance with data protection regulations
Cybersecurity specialist Imperva is launching a new SaaS Cloud Data Security product that gives businesses visibility and compliance oversight for data hosted in a database-as-a-service (DbaaS).
According to a new study, 70 percent of security teams have seen more than double the volume of security alerts in the past five years. These high volumes of reports cause problems for IT security teams with 83 percent saying their security staff experience 'alert fatigue'.
Modern businesses rely on a variety of applications, but failing to understand the relationships between them can lead to increased risks.
To address this vArmour is launching a new version of its Application Controller solution, enabling enterprises to take control of operational risk by discovering and understanding application relationships across their IT environment and help maximize the value of their existing investments.
Microsoft has revealed a new anti-malware service by the name of Project Freta. The company describes it as a "free service from Microsoft Research for detecting evidence of OS and sensor sabotage, such as rootkits and advanced malware, in memory snapshots of live Linux systems".
Project Freta is cloud-based, and the memory forensics tool was created by the NExT Security Ventures (NSV) team in Microsoft Research.
Most IT architectures are complicated. If you’re considering migrating to the cloud, you’re right to be concerned about the many changes that will be required of your architecture and your organization as you make your transition. Cloud migration challenges continue to give organizations anxiety, even though the cloud has been around for nearly 20 years.
Of course, nobody embarks upon a cloud migration expecting to fail. The basic problem is that few people understand the hidden challenges of such a complex project, particularly as it relates to ongoing processes and operations. Unexpected challenges are the curse of any major undertaking, and cloud migrations are truly full of unexpected challenges.