The sudden transition to telework has forced IT departments to rethink how to secure networks, as they implement policies and tools to protect employees working from home.

The sudden transition to telework has forced IT departments to rethink how to secure networks, as they implement policies and tools to protect employees working from home.
ManageEngine survey finds 72% of IT professionals state ITSM continues to be effective in a remote work environment
Ramzi Itani, Vice President – Middle East & Africa at Barco has penned an exclusive op-ed for CNME which examines …
BeyondTrust has announced that its BeyondTrust Privilege Management for Windows and Mac solution is now available as SaaS (software-as-a-service).
The ongoing global COVID-19 pandemic has forced us all to embrace the concept of ‘remote working’. This has led to …
Marcus Whittington, Co-founder & COO, Sentrybay and Abhijit Mahadik, Director – Cybersecurity solutions, Raqmiyat, discuss the risks of enabling remote access from unmanaged devices and how Sentrybay’s solutions can help enterprises stay secure.
More often than not organisations are warned about security incidents that make the headlines tend to be about catastrophic technology failures or breaches caused by nefarious actors. However, what business leaders need to realise is that sometimes the most dangerous threats could be right under their noses.
The threat of a cyber incident – at the hands of an adversary or an insider — looms large in …
Organisations should look at the migration to Windows 10 as an opportunity to upgrade their Windows management. But they must also take measures to maintain security against evolving threats, says Kevin Alexandra, principal consultant at BeyondTrust.
Awingu, the Gartner Cool vendor in ‘Unified Workspaces 2017’, has announced a distribution agreement with AlJammaz Cloud, a business unit …
Newer, smarter, and enhanced technology have facilitated workplace communications, improved user experiences, and made it easier for employees to interact with one another wirelessly and seamlessly, especially in the meeting room space.
Global organisations believe they’ve likely had either a direct or indirect breach due to misused or abused employee access in the last 12 months, according to a recent report by BeyondTrust.
As digital environments become increasingly embedded in higher education institutions they become more susceptible to cyber-attacks. With elements such as open networks, large volumes of data and increasing endpoints, how can university CISOs keep cyber threats at bay?
As part of onboarding, new hires typically sign an employee handbook which includes policies and guidelines for acceptable information technology …
What’s stopping global businesses from protecting their assets despite significant investments in cybersecurity programmes? That’s the question we asked ourselves when trying to determine the reasons are behind the dangerous gap in modern IT security.
The future classroom is well-connected with professors utilising Wi-Fi to their advantage to create an interactive learning experience. As we prepare for this shift, we look at some mistakes that must be avoided.
Enterprises of all sizes are falling victim to very determined malicious actors whose motivations range from financial gain to government sponsored campaigns. The threats are not limited to commercial enterprises but have significant impact on civilian and non-civilian government agencies.
VMware empowers the digital workspace by delivering a consumer simple experience together with enterprise-class security. As businesses move towards digitalisation …
Ashraf Sheet, regional director, Middle East and Africa, Infoblox, discusses the importance of network visibility and control, and the future of connectivity.
The value of endpoint protection platforms is that they can identify specific attacks and speed the response to them once they are detected.