Coronavirus update: as economic stimulus payments start to flow, cyber-attackers want to get their share too (Check Point)
Users that visit these malicious domains instead of the official Government websites risk having their personal information stolen and exposed, or payment theft and fraud.
Zero Trust, SASE-Digital Enablers or Adding Complexity to Cyber Ecosystems (McAfee)
The reality is they [Zero Trust and SASE] are built upon a similar foundation of least privilege management and both matter in the bigger picture. The real question is how do you apply ZTA and SASE to your organization.
Pure Storage Cisco Intersight FlashArray Connector – General Availability
These types of management planes offer the ability to utilise Analytics/AI to simplify infrastructure operations and transform the way businesses support their IT investments.
Infrastructure-as-Code Powering a Monolith to Multi-VM Architecture (Turbonomic)
Designing with a systems thinking approach means that we want to look at our requirements, constraints, assumptions, and risks. The best way to do this is to look at a specific scenario played out which is what we are going to here in the first of our Couch to Cloud Native (C2CN) series.
Are you working securely, or working remotely? (Citrix)
Here are some useful tips you can provide to your teams to help increase their security IQ so they’re situationally aware and contextually risk appropriate.
Office Exodus Drives Endpoint (In)Security (CyberArk)
To support workforce productivity and reduce the strain on IT support teams (who are bombarded with calls from employees unaccustomed to remote work), many organizations choose convenience over security out of a perceived necessity.
Reframing Insider Threat: What Does it Mean When Everyone’s Working from Home? (Forcepoint)
Data is the lifeblood of your business. As are your employees. And, to stay in business in the years ahead it has never been more imperative to employ security solutions that protect the digital crown jewels and those that interact with this critical IP.
Tips for Securing Your Mobile Workforce (Arctic Wolf)
Remote work is the new normal for many organizations. And as more employees rely on their mobile devices to stay connected and get work done, the need for mobile security becomes even greater.
Gotham showed our thanks to local front line workers at Valley Hospital in Ridgewood, NJ yesterday. We are all in this together, let’s reach out and help one another. From our team to yours - we hope you and your loved ones stay safe.
If you or your company is able to assist with providing COVID-19 response funds please consider donating to your local hospital or first responders and patronizing local establishments like Parkwood Deli, who provided these yummy lunches.
Please consider supporting:
Valley Hospital: https://www.valleyhospitalfoundation.org/COVID19HowCanIHelp
Parkwood Deli: https://www.parkwooddeli.com/
Six Considerations for Business Continuity in the Age of Telecommuting
The security decisions intended to support telecommuting could also help to build resiliency to defend against future cyberattacks.