As the coronavirus wave recedes, another surges: cybersecurity. The new work-from-home norm has wreaked havoc on corporate IT and security teams, who are now scrambling to keep employee laptops safe and secure, and lockdown infrastructure access points. Need proof? In...
Numerous surveys of the U.S. workforce and business owners indicate that return-to-office plans are still on hold, a fact that pleases a growing number of employees who have found increased productivity and reduced spending during the pandemic. However, business...
Today, building a successful vendor risk management (VRM) strategy goes far beyond sending out spreadsheets or finding a SaaS tool to assess your vendors. According to the law, this step will check the due diligence box, but if you really want to keep your...
NIST and other vulnerability detection groups have the job of immediately alerting enterprises to new cyber threats. Then, VRM teams have the job of immediately responding. This represents a major shift. Not long ago, information security measures such as system...
Cloud computing and coronavirus are among the most consequential forces impacting cybersecurity today. Together, they have created an “endpoint explosion.” Yesterday’s periodic measures are important; however, the only way to manage today’s cyber risks is with a...