article thumbnail

How device security is evolving and why that matters

CIO

As flexible workforce models stretch that perimeter further, organisations must rethink their cybersecurity strategies. Organisations are wrestling to disentangle work from a physical location as they adjust to flexible work models, and one of the biggest challenges has been dealing with endpoint security.

article thumbnail

10 essential tips for bolstering cloud security in your business

CIO

This makes it more critical than ever to adopt strong security measures to protect sensitive information and infrastructure. However, while cloud computing offers benefits like improved efficiency, scalability, and accessibility, it poses new security challenges.

Cloud 297
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Sharing Responsibility for Data Security in the Cloud

CIO

As organizations shape the contours of a secure edge-to-cloud strategy, it’s important to align with partners that prioritize both cybersecurity and risk management, with clear boundaries of shared responsibility. The security-shared-responsibility model provides a clear definition of the roles and responsibilities for security.”.

article thumbnail

Understanding the security shared responsibility model in an as-a-service world

CIO

As organizations shape the contours of a secure edge-to-cloud strategy, it’s important to align with partners that prioritize both cybersecurity and risk management, with clear boundaries of shared responsibility. The security-shared-responsibility model provides a clear definition of the roles and responsibilities for security.”

article thumbnail

How hackers are approaching medical cybersecurity

The Parallax

READ MORE ON MEDICAL CYBERSECURITY. Triaging modern medicine’s cybersecurity issues How to recover from a health care data breach To prevent EHR breaches, stop using them (Q&A) Ransomware attacks against hospitals: A timeline How weak IoT gadgets can sicken a hospital’s network Opinion: Who foots the bill for medical IoT security?

IoT 189
article thumbnail

How to make your Zoom meetings more secure

The Parallax

Zoom , the video-conferencing app darling of the stay-at-home coronavirus era, is zooming through some cybersecurity growing pains alongside explosive growth. It was a mea culpa for the company, in response to a growing number of security and privacy complaints, as usage shot up, and security researchers found vulnerabilities in Zoom’s code.

Meeting 246
article thumbnail

2017 in cybersecurity and privacy news

The Parallax

From rampant ransomware to the Equifax breach to geopolitical machinations, it’s hard not to be a cynic about the past 12 months of security and privacy news. government computers Kaspersky Lab security software, developed in Russia, it took months longer than its predecessors to publicly unveil a computer security stance.