Remove winning-with-a-mobile-workforce
article thumbnail

NEW TECH: CASBs continue evolving to help CISOs address multiplying ‘cloud-mobile’ risks

The Last Watchdog

It can be argued that we live in a cloud-mobile business environment. Mobile comes into play everywhere. The cloud-mobile environment is here to stay, and it will only get more deeply engrained going forward. LW: You’ve been speaking a lot about the cloud-mobile environment; please explain what you’re referring to.

Cloud 193
article thumbnail

Award Winning Solutions to Achieve a Holistic Approach to Cybersecurity

Thales Cloud Protection & Licensing

Award Winning Solutions to Achieve a Holistic Approach to Cybersecurity. Hybrid workforces, increased regulatory requirements, multi-cloud workloads and the sophistication of adversaries are all top challenges in every executive’s agenda. Secure hybrid workforces – Hybrid working environments seem to be the future.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ROUNDTABLE: Why T-Mobile’s latest huge data breach could fuel attacks directed at mobile devices

The Last Watchdog

At the start of this week, word got out that hackers claimed to have seized personal data for as many as 100 million T-Mobile patrons. According to the attackers, this was a configuration issue on an access point T-Mobile used for testing. T-Mobile left a gate left wide open for attackers – and attackers just had to find the gate.”.

article thumbnail

ROUNDTABLE: Targeting the supply-chain: SolarWinds, then Mimecast and now UScellular

The Last Watchdog

The latest twist: mobile network operator UScellular on Jan. It’s only February, and 2021 already is rapidly shaping up to be the year of supply-chain hacks. Related: The quickening of cyber warfare. The SolarWinds hack came to light in mid-December and has since become a red hot topic in the global cybersecurity community.

Phishing 252
article thumbnail

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

Too often we see companies with strong security policies and tools to protect employee corporate-owned endpoints lacking any security oversite for IoT and mobile devices,” Chris Sherman, senior industry analyst at Forrester told me. Related: Companies sustain damage from IoT attacks That was back in 1982. A lot is at stake.

IoT 279
article thumbnail

Digital Workforce Management Minimizes Security Risk and Improves Business Outcomes

Info Source

26, 2020 – Kofax ®, a leading supplier of Intelligent Automation software to digitally transform end-to-end business operations, today announces new enhancements to its market-leading Intelligent Automation platform which include integration of secure print management and market leading Digital Workforce Management for Kofax RPA. out of 5.0.(1).

Risk 52
article thumbnail

MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

The Last Watchdog

Related: How the Middle East has advanced mobile security regulations Over the past couple of decades, meaningful initiatives to improve online privacy and security, for both companies and consumers, incrementally gained traction in the tech sector and among key regulatory agencies across Europe, the Middle East and North America.