Employee Risk

Qualys Remote Endpoint Protection Zoom Coronavirus COVID-19

Remote Workers Don’t Have to Be Insecure Workers

These are unprecedented times. As countries around the world struggle to contain and respond to the COVID-19 pandemic, businesses of all sizes and across all industries find themselves suddenly trying to maintain business continuity with an entirely remote, work-from-home workforce. […]

Remote Workers Don’t Have to Be Insecure Workers Read More »

insider threat security policy executives

An Unexpected Insider Threat: Senior Executives Who Ignore Cybersecurity Rules

Cybersecurity should be a top concern for any business, with strong policies and protocol put in place, and top executives leading by example. However, recent research has shown that more than half of senior managers disregard the rules, placing their

An Unexpected Insider Threat: Senior Executives Who Ignore Cybersecurity Rules Read More »

intranet cloud security authentication passwords

A No-Compromise Approach to Your Cloud-Based Intranet Security

It’s a well-established fact that companies prefer cloud solutions to on-premises ones when it comes to practically any software. It’s estimated that over 80% of all enterprise workloads will be in the cloud by 2020. But what about an intranet?

A No-Compromise Approach to Your Cloud-Based Intranet Security Read More »

insider threat cybersecurity

Insider Threats: How Can Enterprises Better Protect against this Growing Danger?

According to research from CA Technologies, over half of cybersecurity professionals, or 53 percent, have confirmed an insider attack against their own organization in the past 12 months. These insider threats have had disastrous, sometimes even tragic results, for governments

Insider Threats: How Can Enterprises Better Protect against this Growing Danger? Read More »

zero trust privileged access management

Why Smart CISOs Focus First on Trust

The cybersecurity arms race continues to accelerate. Machine learning and artificial intelligence (AI) make bad actors smarter. Exploits become more sophisticated. Mobile devices multiply the doorways into an organization. As a CISO, how do you keep up? Even though you

Why Smart CISOs Focus First on Trust Read More »

Scroll to Top