images
figures
Blog

Neglected Infrastructure, Invasive Tech to Plague Infosec in 2022

Admin Globaldots
20.04.2020
image 1 Min read
Zero Trust Access Management

Outdated infrastructure, Internet of Things threats, the proliferation of technology, and Internet trust are among the issues that experts predict will cause the biggest problems for security pros by 2022. Businesses will face crises as attackers exploit immature technologies and unprepared victims.

The Information Security Forum’s (ISF) “Threat Horizon 2022” outlines nine threats, broken into three themes, that organizations can expect to face in two years. ISF has been releasing these reports for more than a decade to help security practitioners prepare for the years ahead.

Read more: Dark Reading

Comments

0 comments

There’s more to see

slider item
Zero Trust Access Management

Adapting Security to Work Anywhere

Guest Writer 31.05.21

“Working from home 2021″ marks a massive shift away from common workspaces in response to the global pandemic. There is no more working remotely or working from home, there is just working. The axiom, “work is what you do, not where you go” has never before been so true. The possibility for the workforce to be location independent […]

Read more
slider item
Zero Trust Access Management

Massive Campaign Targeting UK Banks Bypassing 2FA

Guest Writer

On 14 July, 2020, Oliver Hough, a security researcher from Cyjax, published a report centered on a phishing campaign targeting banking customers in the United Kingdom, which evades two-factor authentication (2FA). On 16 December, 2020, researchers from the Global Threat Intelligence Team at WMC disclosed that they were tracking a threat actor who goes by the alias “Kr3pto”. […]

Read more
slider item
Zero Trust Access Management

Why Phishing Attacks Increase on Holiday Seasons

Guest Writer

Overview Phishing continues to be a major attack vector, and it’s surprising just how many security incidents and breaches start with an employee clicking on a link in a carefully crafted phishing email (and sometimes doing the same with a not-so-well crafted phishing email — see this example).  There’s still a general perception that phishing attacks […]

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure