article thumbnail

Analysis: Remote Workplace Security Challenges

Data Breach Today

The latest edition of the ISMG Security Report discusses the cybersecurity challenges posed by the work-at-home shift. Also featured: Tips from NIST on developing remote worker security policies, plus a discussion of the nascent threat of AI meeting assistants.

article thumbnail

Security Buyers Are Consolidating Vendors: Gartner Security Summit

eSecurity Planet

In cloud security, cloud workload protection platforms ( CWPP ) are joining with cloud security posture management (CSPM) and software composition analysis (SCA) to become workload security and CNAPP platforms.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CNIL Releases Guidance on Teleworking

Hunton Privacy

Best Practices for employees while teleworking include: Following the instructions of their employer—in the CNIL’s view, if the employer has issued an information security policy in the context of teleworking, employees should strictly apply it.

article thumbnail

Is your staff’s cyber security awareness up to scratch?

IT Governance

The failure of staff to follow workplace security regulations, as well as criminal hackers finding more ways to exploit members of staff, is becoming an increasing problem. However, this isn’t the case. Last quarter, it was found that four of the five leading causes of data breaches are because of human or process error.

article thumbnail

What IG Professionals Should Know About the Internet of Bodies

ARMA International

Those employees joined a growing number of workers in other countries – Belgium, the UK, and Sweden, to name a few – who use microchips for workplace security, convenience, and commuting. Microchips are just one example of the increasing variety of smart devices that are near to, attached to, or reside inside the human body.

article thumbnail

Survey Finds People are Privacy Hypocrites


A report by HP found that most people admit to looking at others’ computer screens and documents in the workplace while still keeping their own privacy top of mind.

Privacy 42