
Sign up to save your podcasts
Or


It's been nearly a decade since the famed story of a Verizon employee who leveraged a VPN to outsource his job to privately hire workers in China. In 2013, remote employees accessing company networks was a less frequent occurrence than it is now. But today, studies are projecting that by 2025, 36M American employees will work remotely.
HR professionals and business leaders are welcoming a newer, more flexible age of working arrangements to accommodate digital nomads, work-from-home offices, and in some cases, a partial return to the office or hybrid work.
Meanwhile, cybersecurity professionals tasked with managing now ever-expanding digital boundaries of the organization face exponentially increasing threats. All while managing users accessing companies' systems and sensitive data during the once-in-a-career jump to WFH catalyzed by the pandemic has become a new standard working protocol that adds layers of complexity to access control and authentication measures.
In this new cybersecurity best practices discussion, Jonathan Tomek provides background knowledge on the importance of applying threat intelligence protocols to track, identify and analyze IP address data to ensure safe work environments, regardless of how they are accessed.
By Neil C. Hughes5
198198 ratings
It's been nearly a decade since the famed story of a Verizon employee who leveraged a VPN to outsource his job to privately hire workers in China. In 2013, remote employees accessing company networks was a less frequent occurrence than it is now. But today, studies are projecting that by 2025, 36M American employees will work remotely.
HR professionals and business leaders are welcoming a newer, more flexible age of working arrangements to accommodate digital nomads, work-from-home offices, and in some cases, a partial return to the office or hybrid work.
Meanwhile, cybersecurity professionals tasked with managing now ever-expanding digital boundaries of the organization face exponentially increasing threats. All while managing users accessing companies' systems and sensitive data during the once-in-a-career jump to WFH catalyzed by the pandemic has become a new standard working protocol that adds layers of complexity to access control and authentication measures.
In this new cybersecurity best practices discussion, Jonathan Tomek provides background knowledge on the importance of applying threat intelligence protocols to track, identify and analyze IP address data to ensure safe work environments, regardless of how they are accessed.

1,285 Listeners

532 Listeners

1,646 Listeners

1,093 Listeners

160 Listeners

111 Listeners

302 Listeners

332 Listeners

267 Listeners

205 Listeners

9,955 Listeners

5,506 Listeners

350 Listeners

91 Listeners

624 Listeners

0 Listeners

0 Listeners

0 Listeners

0 Listeners

0 Listeners

0 Listeners

0 Listeners