Cybersecurity

The Human Factor 2021

The tragedy, upheaval and historic changes of 2020 have been documented countless times over. But as organisations around the world take their first cautious steps to normal, “the year that wasn’t”1 still holds valuable lessons worth exploring. That’s especially true in the realm of cybersecurity. As the global pandemic upended work and home routines, cyber

The Human Factor 2021 Read More »

The Changing Face of Endpoint Security in a 5G World

In today’s ever-changing cybersecurity landscape, firewall performance should be standardized in order to keep real-5G, the fifth generation of mobile networks, is more than just increased speed; it is a leap towards an always connected future, eliminating the need to rely on public or unsecured Wi-Fi networks, but also introducing new security and management challenges. In this on-demand webinar,

The Changing Face of Endpoint Security in a 5G World Read More »

Building Smarter College Campuses with Multi-Factor Authentication

Student and faculty information can be accessed from anywhere at any time. With that comes the need to restrict unauthorized access to these applications and data. By adopting multi-factor authentication (MFA), higher education institutions know that their information is always safe and compliant. Join and learn about: Education and cybersecurity MFA in college campuses User

Building Smarter College Campuses with Multi-Factor Authentication Read More »

2021 Ransomware Victims Report

The Cold Reality of Ransomware Attacks Ransomware is one of the most widely discussed threats in cybersecurity. However, not enough research exists about the experiences of organizations that have actually suffered from ransomware attacks. For this report, Sapio Research Ltd—an independent research firm—surveyed 200 IT decision makers whose organizations experienced a ransomware attack between 2019

2021 Ransomware Victims Report Read More »

Driving Cybersecurity and Trusted Computing in Defense Systems

Embedded computing for military applications is vulnerable to cyberthreats like every other system. Threats are prevalent throughout every part of the system from the ICs to the signal-board computer to the software. Trust needs to be assured with each hardware component and software element. This webcast of military embedded computing experts will discuss how to

Driving Cybersecurity and Trusted Computing in Defense Systems Read More »