27 Feb 2021Forcepoint.News EMEA Perspective – Building Resilient CybersecurityIt’s no secret that hackers outnumber the cybersecurity professionals trying to stop them. And that gap will likely continue to widen. But Read More 27 Feb 2021News.Opentext Tackling the challenges of remote working during a pandemicPlanning flight operations is a complex and time-critical task, made even more challenging during the coronavirus pandemic. Eurowings, a Read More 27 Feb 2021Array Networks.News 6 Networking Trends in 2021: Let’s Get Braced for the “Next Normal”Over the last decade, we’ve seen some of the most significant disruptions in networking technology. However, nothing beats the speed at Read More 26 Feb 2021Micro Focus.News INSPIRE 20 Podcast: Meet Rod Flavell, CEO, FDM GroupINSPIRE 20 Podcast: Meet Rod Flavell, CEO, FDM Group Rod Flavell, founder and chief executive officer of the FDM Group, ensures that inclusivity Read More 25 Feb 2021Carbon Black.News VMware Carbon Black Named to the 2021 CRN Security 100 ListWe are proud to announce that CRN®, a brand of The Channel Company, has named VMware Carbon Black to its annual Security 100 list. The Read More 24 Feb 202124 Feb 2021News UTIMACO WEBINAR: Securing your IT INFRASTRUCTUREJOIN US on March 11th where we will be presenting you how to ensure your IT infrastructure from attacks. In this webinar we discuss the Read More 24 Feb 2021Cofense.News Telegram Utilized for Harvesting CredentialsTelegram is a popular messaging app. Its encrypted messages, and potential message self-destruct options, can be attractive to legitimate users Read More 23 Feb 2021BeyondTrust.News 3 Powerful Tools for CISOs to Boost their Organizational Influence | BeyondTrust3 Powerful Tools for CISOs to Boost their Organizational Influence | BeyondTrust Free Privileged Account Discovery Tool: Identify & secure Read More 22 Feb 2021NAKIVO.News SharePoint Online Central Administration: A Detailed GuideNAKIVO Blog > Office 365 Administration and Deployment > SharePoint Online Central Administration: A Detailed Guide February 22, 2021 by Read More 21 Feb 2021News.Press releases.ThreatQuotient Reducing Enterprise Cyber Risk During COVID-19Reducing Enterprise Cyber Risk During COVID-19 ED AMOROSO This article was shared with the TAG Cyber community during the earliest days of the Read More 21 Feb 2021News.Versasec A shifting data access and storage dynamic has given rise to a new security category: Secure access service edgeDate: 2021-02-18Author: Ellen Thorén Previous << Sandia National Laboratories Casestudy The growth of mobile, edge and cloud data are Read More 20 Feb 2021Forcepoint.News Help me trojanize you – Microsoft Compiled HTML Help is back for another roundIn the past few weeks, malicious spam campaigns have surfaced that include attachments of varying archive types. Whilst the archives were mostly Read More 20 Feb 2021News.Opentext Modernize your legacy applicationsMany organizations continue to hold onto legacy applications and systems for compliance and regulatory reasons. But they find it expensive and Read More 18 Feb 2021McAfee.News Domain Age as an Internet Filter CriteriaDomain Age Feature Definition The sites and domains of the internet are constantly changing and evolving. In the first quarter of 2020 an average Read More 18 Feb 2021News.Riverbed Pinpointing Application Performance Issues with Unified NPM | RiverbedWith employees and business partners working from home due to the pandemic, non-enterprise internet connections have exacerbated the issue of Read More 18 Feb 2021Allied Telesis.News How Networking Supports Zero Defects ManufacturingIn recent years, manufacturing enterprises are accelerating their digital transformation as part of the fourth industrial revolution (Industry Read More 17 Feb 2021Indeed Identity.News The New Normal of European PKI – An Interview With CA Expert Adam RossThe roundtable «Evolution of Trust: Get ready for PKI 2.0» was about the most confusing, yet vital topics that remain puzzles to many Read More 17 Feb 202117 Feb 2021News Real security is extending their presence with a NDR market leader ExtraHop across the Central Eastern EuropeReal security, a Slovenian based Value Added distributor enters Poland, Czech Republic and Bulgaria by joining forces with ExtraHop, a market Read More 17 Feb 2021Cofense.News Phish Found in SEG-Protected Environments Week ending February 12, 2021100% of the phish seen by the Cofense Phishing Defense Center (PDC) have been found in environments protected by Secure Email Gateways (SEGs), Read More 16 Feb 2021BeyondTrust.News Aligning Credential & Identity-Based Risk Management with Government Mandates | BeyondTrustAligning Credential & Identity-Based Risk Management with Government Mandates | BeyondTrust Free Privileged Account Discovery Tool: Identify Read More 16 Feb 202116 Feb 2021News JOIN THE EKRAN SYSTEM PARTNER PROGRAMEkran System® is a full cycle insider threat management platform that focuses on three core goals: deter, detect, and disrupt Date: Friday, 19th Read More 16 Feb 2021News.Qualys Expand Your Vulnerability & Patch Management Program to Mobile Devices with Qualys VMDRAs mobile devices have become ubiquitous in almost every business process, whether in bank branches, manufacturing sites or retail stores, they Read More 14 Feb 2021News.Niagara Networks A brand-new year and cybersecurity defense thoughtsIt is a brand-new year, and by now you would probably hear from someone that they were busy or sharing about their unique virtual SKO experience.Read More 14 Feb 2021News.Press releases.ThreatQuotient Automate, Adopt, Adapt: How Cyber Threat Intelligence Evolved over the last 12 monthsAutomate, Adopt, Adapt: How Cyber Threat Intelligence Evolved over the last 12 months LIZ BUSH The SANS 2021 Cyber Threat Intelligence (CTI) Read More 13 Feb 2021Forcepoint.News Why Zero Trust is Needed in the Real World TooA real-word example of why Zero Trust matters But the need for Zero Trust doesn’t stop at the cyber edge. With so many processes in our daily Read More 13 Feb 2021News.Opentext What is digital experience?Digital experience inhabits a realm packed with similar terms. You have digital experience management (DXM), customer experience (CX), customer Read More 12 Feb 2021Micro Focus.News Spotlight on Black History MonthAt Micro Focus, our theme for Black History Month in 2021 is “Embracing the Past While Building for the Future”. We caught up with Eric Beulah, Read More 11 Feb 2021Ivanti.News February Patch Tuesday 2021Second Patch Tuesday of 2021 is here and while the CVE counts are low there are a number of publicly disclosed and zero day vulnerabilities to be Read More 11 Feb 2021Gartner.McAfee.News XDR – Please Explain?Security vendors have spent the last two decades providing more of the same orchestration, detection, and Read More 10 Feb 2021Cofense.News Phish Found in Proofpoint-Protected Environments Week ending February 5, 2021Cofense solutions enable organizations to identify, analyze, and quarantine email threats in minutes. 100% of the phish seen by Read More 9 Feb 2021BeyondTrust.News A Cybersecurity Wellness Check for the Healthcare Industry | BeyondTrustA Cybersecurity Wellness Check for the Healthcare Industry | BeyondTrust Free Privileged Account Discovery Tool: Identify & secure Read More 9 Feb 2021News.Qualys Unified SaaS Application Security, Detection, and ResponseOrganizations are rapidly embracing Software as a Service (SaaS) applications for scalability, ease & flexibility of use, and the benefits of Read More 8 Feb 2021NAKIVO.News How to Use SharePoint Online for Data Management: A Complete GuideNAKIVO Blog > Office 365 Administration and Deployment > How to Use SharePoint Online for Data Management: A Complete Guide February 8, Read More 8 Feb 2021McAfee.News 6 Best Practices for SecOps in the Wake of the Sunburst Threat CampaignPlan, test and continuously improve your SecOps processes with effective purple-teaming exercises. Try to think like a stealthy attacker and Read More 7 Feb 2021News.Press releases.ThreatQuotient How ThreatQ Helps Bridge the Threat Hunting Skills GapHow ThreatQ Helps Bridge the Threat Hunting Skills Gap LIZ BUSH If you’re not familiar with the TAG Cyber Security Annual, you should be! Read More 6 Feb 2021Forcepoint.News Understanding Insider Threat Before the BreachTwo recent examples of insider threat show how incorrect information can lead to bad decisions. In one, a data scientist who previously tracked Read More 6 Feb 2021News.Opentext For many patients, telehealth is here to stayTelehealth has been a topic of discussion for decades in healthcare. While innovators in medicine and technology have long promoted the Read More 5 Feb 2021Micro Focus.News Strategically #BetterTogether – Micro Focus plus our Channel PartnersHow do we measure how strategic we are to our customers? Micro Focus uses double-blind competitive benchmarking in order to gauge how well we Read More 4 Feb 2021Carbon Black.News The State of Healthcare Cybersecurity: VMware Carbon Black Explores the Surge in Cyber ThreatsOn the frontline of the pandemic, perhaps no industry was impacted and forced to innovate and transform as quickly as healthcare in 2020. Whether Read More 3 Feb 2021News.Riverbed Data Security Challenges in the Rush to the Cloud | RiverbedIn their rush to the cloud, enterprises will need to take into consideration three new data security challenges as they reevaluate where their Read More 3 Feb 2021News.Riverbed Data Security Challenges in the Rush to the Cloud | RiverbedThe challenges of working from home have caused organizations to reevaluate how they look at their networks and the data that lives on them. The Read More 3 Feb 2021Cofense.News Emotet Disrupted but Likely to ReturnBackground Originally a banking Trojan, Emotet evolved to become more of a gateway for other malware families such as Ryuk, TrickBot, Read More 2 Feb 2021News.Titus HIPAA and 2021 Healthcare Data Security TrendsGeorgina Stockley · Tuesday, February 2nd, 2021 The ramifications of this year’s global pandemic will continue to drive unprecedented Read More 2 Feb 2021Forcepoint.News.Webinars How Cybersecurity Changed in 2020 and What it Means for 2021Now, as much of the world continues working from home, that means company data, networks and employees themselves are vulnerable to multiple Read More 2 Feb 2021BeyondTrust.News Understanding Sudo Vulnerability CVE-2021-3156 & How Privilege Management for Unix & Linux Can Help | BeyondTrustUnderstanding Sudo Vulnerability CVE-2021-3156 & How Privilege Management for Unix & Linux Can Help | BeyondTrust Free Privileged Account Read More 2 Feb 2021News.PROFITAP DNS – OR ALSO: WHY IS MY INTERNET NOT WORKING?This blog was written in collaboration with magellan netzwerke GmbH, A Profitap Partner. DNS – OR ALSO: WHY IS MY INTERNET NOT Read More 2 Feb 2021News.Qualys Unpacking the CVEs in the FireEye Breach – Start Here FirstIn a blog post on Dec. 22, 2020, Qualys revealed it has identified 7.5 million instances of vulnerability to the stolen FireEye Red Team Read More 1 Feb 2021NAKIVO.News How to Request SSL Certificates from a Windows Certificate Server for Hyper-VNAKIVO Blog > Hyper-V Administration and Backup > How to Request SSL Certificates from a Windows Certificate Server for Hyper-V February 1, Read More 1 Feb 2021McAfee.News Schrems II – A few Things to Keep in Mind!Alas, we have possibly never been so much away of such harmonization. 128 out of 194 countries have put in place legislation to secure the Read More 1 Feb 2021Micro Focus.News Inspiring students to imagine their future careersUnder Pressure For too long, there has been tremendous reliance on parents, schools and government to capture children’s imaginations – to help Read More 31 Jan 2021News.ThreatQuotient ThreatQuotient appoints Eutimio Fernandez as new Country Manager for SpainMadrid, January 29, 2021 – ThreatQuotient, a leader in Security Operations Platforms, today announced the appointment of Eutimio Fernandez Read More 31 Jan 2021News.Versasec For more than 70 years, Sandia National Labs has resolved the nation’s challenging security issues, and they turned to Versasec’s vSEC:CMS to solve their security migration challenges.Date: 2021-01-25Author: Carolina Martinez Previous << Effective Remote PKI Management For more than 70 years, Sandia has delivered Read More 30 Jan 2021Forcepoint.News Managing the Insider Threat – An ISF Panel DiscussionThe goal of the panel discussion was to explore insider threat and the impact it has on cybersecurity while offering tangible solutions for Read More 30 Jan 2021News.Opentext Digitalization in procurementA recent blog on ‘The resilient Procurement organization’ described the benefits of using OpenText™ Extended ECM for SAP® Read More 29 Jan 2021Micro Focus.News Data Privacy Day: Why Protecting Data Matters to Your Bottom LineWhen it comes to data privacy, who do consumers trust? A recent data privacy survey by McKinsey & Company asked 1,000 consumers to rank the Read More 28 Jan 2021Carbon Black.News VMware Carbon Black Champions Data Privacy Day 2021Today is Data Privacy Day, an annual effort hosted by the National Cybersecurity Alliance (NCSA) to raise awareness about the importance of Read More 27 Jan 2021Cofense.News Phish Found in Proofpoint-Protected Environments Week ending January 22, 2021Cofense solutions enable organizations to identify, analyze and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More 26 Jan 2021News.Titus 10 Tips to Protect Your Company´s Data in 2021Georgina Stockley · Monday, January 25th, 2021 The amount, complexity, and relevance of the data that companies handle has increased Read More 26 Jan 2021BeyondTrust.News Privilege Management for Unix & Linux Continues Rapid Growth by Securing Cloud Infrastructure | BeyondTrustPrivilege Management for Unix & Linux Continues Rapid Growth by Securing Cloud Infrastructure | BeyondTrust Free Privileged Account Discovery Read More 25 Jan 2021NAKIVO.News.Webinars Free Live Webinar – Save Your Seat Now!NAKIVO Blog > NAKIVO News > Free Live Webinar – Save Your Seat Now! January 19, 2021 by Grace Norman The adoption of Microsoft 365 has had Read More 24 Jan 2021News.Press releases.ThreatQuotient Threat hunting is now pervasive, learn how the ThreatQ Platform helps support your teamThreat hunting is now pervasive, learn how the ThreatQ Platform helps support your team LIZ BUSH As I mentioned in an earlier blog, threat Read More 23 Jan 2021Forcepoint.News Revolutionising Cybersecurity – SASE Special Report by RaconteurThere are six parts to the paper. It is interspersed with independent market data from the Ponemon Institute, Accelerate Technologies, Accenture Read More 23 Jan 2021News.Opentext We need to talk about contentLet’s start with a question: In the current focus on digital initiatives, are energy companies overlooking the importance of content? And, Read More 22 Jan 202125 Jan 2021News.ThreatQuotient THREATQUOTIENT WEBINAR: Empower the human element with Cyber Threat IntelligenceThe most important asset in your organization is your human resource, who will run the investigation, analyse the data and take actions on it. Read More 22 Jan 2021Micro Focus.News How Many COBOL Programmers Does it Take to Change a Lightbulb?COBOL’s continued popularity receives further evidence. Digital Marketing expert and avid COBOL fan Mark Plant reports that another major Read More 21 Jan 2021Carbon Black.News VMware Carbon Black Cloud™ Awarded Cyber Catalyst DesignationVMware Carbon Black Cloud has been awarded a Cyber CatalystSM designation for its cloud native endpoint and workload protection platforms, which Read More 19 Jan 2021BeyondTrust.News Protecting the Government Workforce of the Future with Secure Remote Access | BeyondTrustProtecting the Government Workforce of the Future with Secure Remote Access | BeyondTrust Free Privileged Account Discovery Tool: Identify & Read More 19 Jan 2021News.Qualys January 2021 Patch Tuesday – 83 Vulnerabilities, 10 Critical, One Zero Day, AdobeThis month’s Microsoft Patch Tuesday addresses 83 vulnerabilities. The 10 Critical vulnerabilities cover Windows codecs, Office, HEVC video Read More 18 Jan 2021News.Riverbed User Experience/App Performance vs. Network Security | Enterprise SD-WAN Trade-Offs | RiverbedIs it possible to meet user expectations and maintain SD-WAN security? One benefit of SD-WAN is that it makes it easy to steer certain traffic Read More 17 Jan 2021News.ThreatQuotient ThreatQuotient Named McAfee’s Global Security Innovation Alliance Partner Of The Year For Second Consecutive YearDepth of integrations, early MVISION Marketplace launch, and the most deal closures within SIA programs distinguishes ThreatQuotient among McAfee Read More 17 Jan 2021News.Versasec As remote workforces grow, managing PKI devices is still simple and effectiveDate: 2021-01-12Author: Anders Adolfsson and Michael Samara Previous << Microsoft Store Due to the 2020 global pandemic, companies are Read More 16 Jan 2021Forcepoint.News Top 10 To The Point Cybersecurity Podcast Episodes of 2020And without further ado, here’s the Top 10 episodes of 2020: Be one of the first 10 to share the episode or this blog and receive your Read More 16 Jan 2021News.Opentext 7 information challenges impacting the semiconductor boom in 2021While the worst of the COVID-19 pandemic slowed the semiconductor sector, it is now recovering and can look forward Read More 15 Jan 2021Micro Focus.News INSPIRE 20 Podcast: Meet Morag Lucey of TeleverdeIt’s back, the INSPIRE 20 podcast returns today with Morag Lucey, CEO of Televerde, a company built on second chances. This forward thinking Read More 14 Jan 2021Carbon Black.News.Webinars Bridge the Gap between Security and IT in Cloud Workload ProtectionIt often feels as though Security and IT are trying to build the same house from different blueprints. Security works tirelessly to stay ahead of Read More 14 Jan 202121 Jan 2021I4P.News Encryption resolution adoptedThe Council of Europe has adopted a resolution on encryption that states that competent authorities must be able to access encrypted data in a Read More 13 Jan 2021Checkmarx.News CVE-2020-35774: twitter-server XSS Vulnerability DiscoveredAfter researching twitter-server, the Checkmarx Security Research Team discovered a reflected cross-site scripting (XSS) vulnerability, assigned Read More 13 Jan 2021Cofense.News Coronavirus Screening and Testing, and a Sense of Urgency Among EmployeesThe Cofense PDC (Phishing Defense Center) has seen a continuous campaign by malicious actors exploiting the COVID-19 pandemic by using cleverly Read More 12 Jan 2021BeyondTrust.News How to Manage Your CI/CD Toolset Secrets with One Solution: 6 Benefits of DevOps Secrets Safe | BeyondTrustHow to Manage Your CI/CD Toolset Secrets with One Solution: 6 Benefits of DevOps Secrets Safe | BeyondTrust Free Privileged Account Discovery Read More 11 Jan 2021Ivanti.News 5G and the Journey to the EdgeRecently, AT&T Cybersecuritypublished important findings in the tenth edition of their Insights report entitled, “ 5G and the Journey to the Read More 11 Jan 2021McAfee.News McAfee Welcomes its ISO 27701 Certificate!At McAfee, we adhere to a set of core values and principles – We Put the Customer at The Core, We Achieve Excellence with Speed and Read More 10 Jan 2021News.ThreatQuotient Perseverance. Pushing Security Operations Forward in 2021We Have the Capabilities to Persevere and Reach the Next Level of Security Maturity For obvious reasons, perseverance has been the theme for 2020 Read More 10 Jan 2021FireEye.News Excelerating Analysis – Tips and Tricks to Analyze Data with Microsoft ExcelIncident response investigations don’t always involve standard host-based artifacts with fully developed parsing and analysis tools. At FireEye Read More 9 Jan 2021Forcepoint.News Looking Back at December’s To The Point Cybersecurity Podcast EpisodesForcepoint To The Point Cybersecurity In December, To The Point Cybersecurity podcast featured discussions with government cyber leaders on Read More 9 Jan 2021News.Opentext Evolving customer communicationsTargeted customer communications are a powerful way to increase engagement and build brand loyalty. Done poorly, Read More 7 Jan 2021McAfee.News The Road to XDRThe Building Pressure for XDR Let’s start with why XDR? The cry for XDR reflects where cybersecurity is today with fragmented, Read More 6 Jan 2021FireEye.News Leveraging Smart Launcher to Evade the EvadersSmart Launcher is a technology designed by FireEye to rapidly upgrade and modify the FireEye MVX sandbox technology used in our Network Security Read More 6 Jan 2021Cofense.News All I Wanted Was for 2020 to End2020 was far from ordinary. By Dylan Duncan Every year, we see threat actors improve their methods and adapt to world events, bringing new Read More 5 Jan 2021News.Qualys Technical Deep Dive Into SolarWinds BreachMany organizations have been compromised by the recent SolarWinds breach, which seems to be a targeted attack against both government and private Read More 5 Jan 2021Centrify.News RSS is deletedThis RSS is deleted because you didn’t use it for long time. Please consider purchasing one of our PRO plans to prevent this in the future Read More 4 Jan 2021NAKIVO.News Why You Shouldn’t Use SharePoint Online as a DatabaseNAKIVO Blog > Office 365 Administration and Deployment > Why You Shouldn’t Use SharePoint Online as a Database December 28, 2020 by Michael Read More 3 Jan 2021News.Riverbed Maximizing Network and Application Performance and Visibility: TFD22 Recap | RiverbedThe last three months may have been a whirlwind of activity for you. Many organizations are trying to wind down projects, wrap up the spending on Read More 2 Jan 2021Forcepoint.News Welcome to the Unbound EnterpriseUnderstanding the Need for the Unbound Enterprise Unbound Work Requires Unbound Security Getting to unbound depends on a corporate leadership Read More 31 Dec 2020Indeed Identity.News Roundtable: Evolution of Trust. Get ready for PKI 2.0In the digital era, PKI is one of the most effective technologies for authentication of users and devices that is used by worldwide companies for Read More 30 Dec 2020Checkmarx.News Preventing Developer Burnout in the Age of Rapid Software DeliveryThis increased pace and immense pressure surrounding software development have made burnout an even bigger reality than before, at a time when Read More 30 Dec 2020Cofense.News Emotet is Back for the Holidays with Updated TacticsAfter a lull of nearly two months, the Emotet botnet has returned with updated payloads. The changes are likely meant to help Emotet avoid Read More 29 Dec 2020BeyondTrust.News.Webinars 15 Most Popular Cybersecurity Webinars of 2020: BeyondTrust Edition | BeyondTrust15 Most Popular Cybersecurity Webinars of 2020: BeyondTrust Edition | BeyondTrust December 28, 2020 Open You May Also Be Interested In: Our Read More 29 Dec 2020News.Qualys Qualys Security Advisory: SolarWinds / FireEyeQualys Researchers found Millions of devices exposed to vulnerabilities used in the stolen FireEye Red Team tools and SolarWinds Orion by Read More 28 Dec 2020NAKIVO.News Data Backup Solutions: The Most Trending Features in 2021NAKIVO Blog > NAKIVO Backup & Replication > Data Backup Solutions: The Most Trending Features in 2021 December 24, 2020 by Grace Norman Read More 27 Dec 2020News.Press releases.ThreatQuotient Know More about the Impact of the SolarWinds Breach on your Environment with ThreatQKnow More about the Impact of the SolarWinds Breach on your Environment with ThreatQ ROSS HAMMER With the recent compromise announcement from Read More 27 Dec 2020News.Versasec The Popular vSEC:TOOL K-Series is Now Available in the Microsoft StoreNow available in the Microsoft Store, vSEC:TOOL K-Series Helps Users Evaluate PKI credential rollout plans. Apple started their App Store 12 Read More 26 Dec 2020Forcepoint.News.Webinars Grant Thornton – Insider Threat Q&AQ: As insider threat increases at an alarming rate, it continues to be one of the most challenging problems for organizations to solve. Do you Read More 24 Dec 2020Carbon Black.News Enterprise EDR Expands New Linux Coverage to SUSE, OpenSUSE, Ubuntu, Oracle & Amazon LinuxVMware Carbon Black is pleased to announce an exciting expansion of Linux distribution coverage for Enterprise EDR users on the VMware Carbon Read More 24 Dec 2020Gartner.McAfee.News Finally, True Unified Multi-Vector Data Protection in a Cloud WorldAccording to a report by Gartner earlier in 2020, 88% of organizations have encouraged or required employees to work from home. And a report from Read More 23 Dec 2020Checkmarx.News 2020 Checkmarx Partner Awards – APJ, EMEA & LATAM2020 has been a year like no other and it has certainly demonstrated just how creative, determined, and committed our partners are as they have Read More 23 Dec 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week ending December 18, 2020Cofense solutions enable organizations to identify, analyze and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More 22 Dec 2020BeyondTrust.News Least Privilege Application Management – A Lesson Learned from SolarWinds Orion | BeyondTrustLeast Privilege Application Management – A Lesson Learned from SolarWinds Orion | BeyondTrust December 22, 2020 Open You May Also Be Read More 22 Dec 2020News.Qualys Adobe Flash Player Reaches End of Life on December 31, 2020In July 2017, Adobe announced that Adobe Flash Player will reach “End of Life” (EOL) on Thursday, December 31, 2020. After this date, Adobe Flash Read More 21 Dec 2020NAKIVO.News Tips and Tools for Microsoft Hyper-V MonitoringNAKIVO Blog > Hyper-V Administration and Backup > Tips and Tools for Microsoft Hyper-V Monitoring December 17, 2020 by Michael Bose The Read More 21 Dec 2020McAfee.News 3 Reasons Why Connected Apps are Critical to Enterprise SecurityWhat are Connected Apps? Collaboration platforms such as Office 365 enable teams and end-users to install and connect third-party Read More 20 Dec 2020News.ThreatQuotient Focusing the SOC on Detection and ResponseThreat Intelligence is the Foundation and Lifeblood of the Security Operations Center We all know the security industry mantra: it’s not a Read More 20 Dec 2020FireEye.News Direct Access to Threat Intelligence With Mandiant AdvantageOur customers and partners have been asking for an easier way to stay informed of threat intelligence announcements. To address this need, Read More 20 Dec 2020News.Versasec Interview with DigiCert. What does the future of PKI look like? Why are DigiCert ONE and Versasec vSEC:CMS such a great fit?Date: 2020-12-18Author: Anders Adolfsson, Versasec Technical Consultant Previous << Team Building in the time of Covid Versasec integrates Read More 20 Dec 2020Allied Telesis.News Public Wi-Fi Security Best PracticesThe common experience of public Wi-Fi is usually frustrating and unreliable due to the cumbersome and repetitive authentication process. In Read More 19 Dec 2020Forcepoint.News.Webinars Understanding Negative Workplace Behaviors (and What You Can Do About it)At some point, we all behave in ways that expose organizations to risk. Negative workplace behaviors contribute to organizational risk, as these Read More 19 Dec 2020News.Opentext Navigating business recovery with AIWith the dramatic changes brought on by COVID-19, businesses are having to adapt to remote working, reduced budgets, and Read More 19 Dec 2020Centrify.News Centrify goes 3-for-3 as a PIM Leader in 2020This week, The Forrester Wave™: Privileged Identity Management, Q4 2020 report was published and Centrify was named a Leader among the 10 Read More 18 Dec 2020FireEye.News DebUNCing Attribution: How Mandiant Tracks Uncategorized Threat ActorsMany people are hearing the term UNC for the first time after we published details of a threat group we refer to as UNC2452. “UNC” groups—or Read More 18 Dec 2020News.Riverbed Bandwidth Cost vs. App Performance | Enterprise SD-WAN Trade-Offs | RiverbedSD-WAN makes it easy to incorporate less-costly bandwidth options like Internet Broadband and LTE at remote locations. What are the Read More 18 Dec 2020News.Riverbed Bandwidth Cost vs. App Performance | Enterprise SD-WAN Trade-Offs | RiverbedSD-WAN makes it easy to incorporate less-costly bandwidth options like Internet Broadband and LTE at remote locations. What are the Read More 18 Dec 2020Micro Focus.News INSPIRE 20 Podcast: Putri Realita, DanoneToday, we are sharing one last excellent INSPIRE 20 podcast before our team takes a well-deserved holiday break – and we hope you enjoy the same! Read More 17 Dec 2020Indeed Identity.News Pacific Tech and Indeed Identity announce strategic partnershipPacific Tech and Indeed Identity enter into a partnership that brings together Indeed Identity cutting-edge cybersecurity products and Pacific Read More 17 Dec 2020McAfee.News How OCA Empowers Your XDR JourneyXDR Promise Let’s start with an understanding of XDR. There is a range of XDR definitions but at the end of day there are core desired Read More 16 Dec 202016 Dec 2020Netwrix.News.Vendors Data Security in 2021: Lessons Learned Looking Back and What to Expect Looking ForwardLive Webinar on Thursday, December 17 at 10am GMT/11 am CET. No one has a crystal ball that reveals exactly what data security challenges we’ll Read More 16 Dec 2020FireEye.News Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST BackdoorExecutive Summary We have discovered a global intrusion campaign. We are tracking the actors behind this campaign as UNC2452. FireEye discovered Read More 16 Dec 202016 Dec 2020Group-IB.News.Vendors Egregor ransomware: white paper & webinarRegardless of how big or protected your company may be, ransomware remains a very real threat. Egregor, a ransomware family that appeared just in Read More 16 Dec 2020Checkmarx.News 2021 Software Security Predictions: Our Experts Weigh InNevertheless, with all of the adjustments that took place, the world of cyber attacker vs. cyber defender did not change much, other than the Read More 16 Dec 2020Cofense.News Strategic Analysis: Agent Tesla Expands Targeting and Networking CapabilitiesThreat actors who transition to this version of Agent Tesla gain the capability to target a wider range of stored credentials, including those Read More 15 Dec 2020Forcepoint.News.Webinars Indicators of Behavior (IOBs) – With 2020 VisionQ: How are Indicators of Behavior different than Indicators of Compromise?A: It is important to look at Indicators of Behavior because we, as an Read More 15 Dec 2020BeyondTrust.News Remote Support for Zebra Mobile Devices | BeyondTrustRemote Support for Zebra Mobile Devices | BeyondTrust December 14, 2020 Open You May Also Be Interested In: Our website uses cookies to provide a Read More 15 Dec 2020News.Qualys FireEye Breach Leveraged SolarWinds Orion SoftwareOn December 8, 2020, FireEye disclosed theft of their Red Team assessment tools. FireEye has confirmed the attack leveraged trojanized updates to Read More 14 Dec 2020NAKIVO.News What Type of a Remote Sysadmin Are You?With only a few weeks left till 2021, we can definitely say that 2020 was the most challenging year in decades. One of the most unexpected things Read More 14 Dec 2020Gartner.McAfee.News 10 Reasons to Celebrate 20201. January 2020 Gartner Peer Insights VOC Customers’ Choice for CASB Everyone deserves a break after surviving this past year and I Read More 13 Dec 2020News.Press releases.ThreatQuotient The Evolution of Threat Intelligence PlatformsThe Evolution of Threat Intelligence Platforms CYRILLE BADEAU Initially designed to compensate for the heterogeneity and volume of external Read More 12 Dec 2020Forcepoint.News.Webinars Next Week – Hear from Cybersecurity Industry Leaders at Forcepoint Exchange: Futures and InsightsIt’s time to get ahead Forcepoint Exchange: Futures and Insights Join sessions ‘A Necessary Change in the Data Protection Mindset’ and ‘Slackers, Read More 12 Dec 2020News.Opentext OpenText funds 4 million meals this holiday season2020 has been a most challenging year, and food insecurity has dramatically increased over the last year globally. In Canada alone: 2 Million Read More 11 Dec 2020FireEye.News FireEye Shares Details of Recent Cyber Attack, Actions to Protect CommunityFireEye is on the front lines defending companies and critical infrastructure globally from cyber threats. We witness the growing threat Read More 11 Dec 2020Ivanti.News December Patch Tuesday 2020For all of you who have asked for a pause to Patch Tuesday, you did not get exactly what you wanted for Christmas, but close. December Patch Read More 11 Dec 2020Micro Focus.News Amazing Grace Hopper – HAPPY BIRTHDAYWhen a bright, 30-something persuaded the authorities to waive the restrictions on age and weight, and joined the US Navy in 1944, no-one could Read More 10 Dec 2020Carbon Black.News Protect Yourself from Holiday Cyber Threats – Ask the Howlers, Episode 16 HighlightsIn episode 16 of “Ask the Howlers,” host Stacia Tympanick, senior solution engineer, met up with Ryan Hendricks, staff architect and Read More 10 Dec 2020McAfee.News Securing Containers with NIST 800-190 and MVISION CNAPPAs more enterprises adapt to cloud-native architectures and embark on multi-cloud strategies, demands are changing usage patterns, processes, and Read More 9 Dec 2020FireEye.News Unauthorized Access of FireEye Red Team ToolsOverview A highly sophisticated state-sponsored adversary stole FireEye Red Team tools. Because we believe that an adversary possesses these Read More 9 Dec 2020Checkmarx.News Seven Ways We’ve Helped our Partners Transform to Digital Reality During COVIDAmong organizations that experienced a sudden and dramatic interruption to “business as usual” were the many resellers that market software Read More 9 Dec 2020Cofense.News You Must Quarantine! Fake Office 365 Email Leads to CuriosityThe Cofense Phishing Defense Center (PDC) has discovered a recent phishing campaign that has targeted Office 365 users and includes a convincing Read More 8 Dec 2020Forcepoint.News Zero Trust Network Access (ZTNA) Replaces Implicit Trust with Explicit TrustCloud applications were no problem for newly remote workers to get to (which provided a lot of motivation to switch to SaaS apps where possible). Read More 8 Dec 2020BeyondTrust.News Demystifying Azure PIM: What it is, How it Works, What it Doesn’t Do | BeyondTrustDemystifying Azure PIM: What it is, How it Works, What it Doesn’t Do | BeyondTrust December 7, 2020 Open You May Also Be Interested In: Our Read More 7 Dec 2020Micro Focus.News Escape Endless Implementation with Micro Focus Enterprise Service ManagementCompanies are relying on Service Desks more than ever in this pandemic. More employees are working from home and do not have access to their Read More 6 Dec 2020News.Press releases.ThreatQuotient The ThreatQ Platform: Powering the XDR MovementThe ThreatQ Platform: Powering the XDR Movement MARC SOLOMON In my previous blog, I talked about the integration imperative for Extended Read More 6 Dec 2020FireEye.News Protecting Healthcare and Academia Against Cyber ThreatsAs the COVID-19 pandemic continues, cyber threats have worsened for several industries across the globe. Universities with medical and research Read More 6 Dec 2020News.Versasec Versasec at APEX 2020Date: 2020-11-30Author: Joakim Thorén, CEO Previous << Expand WHfB We are excited to be a part of the annual Apica Performance Excellence Read More 5 Dec 2020Forcepoint.News Automated Forcepoint NGFW High Availability with Azure Resource ManagerThis is why Forcepoint developed an Azure Resource Manager template which deploys a redundant stack of Forcepoint Next Generation Firewall Read More 5 Dec 2020News.Opentext The Future of Cyber Resilience—Enfuse On Air 2020The Future of Cyber Resilience – Click Here to View the Keynote OpenText’s 20th annual Enfuse conference—the cybersecurity and Read More 4 Dec 2020News.ThreatMark ThreatMark named in the RegTech100We’re proud to announce that ThreatMark has been included in the RegTech100 for 2021. The 2021 RegTech100 is launched by specialist research firm Read More 4 Dec 2020FireEye.News Informed Decision Making Regardless of the Tools or Controls in UseThe cyber security industry has been its own enemy as each security vendor focuses on their own specific toolset and unique detection algorithm, Read More 4 Dec 2020Micro Focus.News INSPIRE 20 Podcast: Anna Mok, Ascend LeadershipHappy Monday, and welcome back from the Thanksgiving holiday, for all of our US friends that celebrated! We are kicking the week off feeling Read More 3 Dec 2020Carbon Black.News A Look Ahead: 9 Cybersecurity Predictions for 2021Following an unprecedented year, what’s to come for cybersecurity in 2021? The ripple effects of the global pandemic have created a new Read More 3 Dec 2020McAfee.News Think Beyond the Edge: Why SASE is Incomplete Without Endpoint DLPOrganizations have been in the midst of digital transformation projects for years, but this development represented a massive test. Most Read More 3 Dec 2020News.Riverbed Speed CAD File Downloads | Improve CAD Application Performance | RiverbedWhy design professionals at architectural, engineering, construction and related firms struggle with running CAD applications remotely—and how to Read More 2 Dec 2020FireEye.News Using Speakeasy Emulation Framework Programmatically to Unpack MalwareAndrew Davis recently announced the public release of his new Windows emulation framework named Speakeasy. While the introductory blog post Read More 2 Dec 2020Checkmarx.News How Agencies Can Take Advantage of DevSecOps and Automation to Accelerate ATOsTo discuss how agencies can take advantage of DevSecOps, while meeting their ATO and security requirements in the same timely fashion, Checkmarx Read More 2 Dec 2020News.PROFITAP Preventing Network Downtime during Black FridayThe shopping spree starting on Black Friday, rolling over to Cyber Monday is one of the most critical times for Logistics centers, optimized Read More 2 Dec 2020Cofense.News The New Cofense Resource CenterToday, Cofense officially launched its new Resource Center. Formerly known as Community, the new Resource Center features a completely redesigned Read More 1 Dec 2020BeyondTrust.News Is Your Remote Access Strategy Adapted for the New Normal? | BeyondTrustIs Your Remote Access Strategy Adapted for the New Normal? | BeyondTrust November 30, 2020 Open You May Also Be Interested In: Our website uses Read More 1 Dec 202021 Jan 2021I4P.News Noreg – new i4p reselling partnerWe’re delighted to welcome one of the best known IT security integrators on the Hungarian market Noreg as an i4p reselling partner. We’ve Read More 1 Dec 2020News.Qualys Qualys Research Nominated for Pwnie Awards 2020The Qualys Security Advisory team has been nominated for five Pwnie Awards this year in three different categories. In addition to nominations Read More 29 Nov 2020News.Niagara Networks SecOps Blind sighted!?Privacy, both in the physical and online world, is one of the things most people value dearly. With the inevitable shift from physical locations Read More 29 Nov 2020FireEye.News A Look Back and a Look Forward: Cyber Security in 2021With 2020 coming to an end, we’ve released our 2021 cyber security predictions report, videos with our senior leaders and more. I asked Major Read More 28 Nov 2020News.Opentext 10 Reasons to upgrade OpenText Content Suite and Extended ECMReason #1: Cloud Editions In a recent Forrester Consulting Study, it was revealed that 64% of organizations that store all their content Read More 27 Nov 2020News.ThreatMark ThreatMark Recognized in Deloitte’s Top Technology Fast 50 for Central EuropeThreatMark has been included in Deloitte’s 2020 Technology Fast 50 CE – list honoring the most innovative and fastest-growing technology Read More 27 Nov 2020FireEye.News FireEye Options for Symantec CustomersCustomers of Symantec enterprise solutions continue to feel the impact of Broadcom’s acquisition. After Broadcom discontinued Symantec Endpoint Read More 27 Nov 2020Micro Focus.News GreenLight Group’s GITOpS – what is it and why does it matter?What is GITOpS (and why does it matter)? Operations is the lifeblood of every IT department, and for most IT managers it’s also the bane of their Read More 26 Nov 2020Carbon Black.News 3 Ways to Hunt for the ZeroLogon Vulnerability on Your Windows ServersVulnerability assessment and patch management can be painful time-consuming processes. From the Security team looking at vulnerability reports Read More 25 Nov 2020FireEye.News Election Cyber Threats in the Asia-Pacific RegionIn democratic societies, elections are the mechanism for choosing heads of state and policymakers. There are strong incentives for adversary Read More 25 Nov 2020Checkmarx.News Drupal Core: Behind the VulnerabilityThis article covers the technical facets of CVE-2020-13663 that were made public by Checkmarx in June 2020, but whose details were never Read More 25 Nov 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week ending November 20, 2020Cofense solutions enable organizations to identify, analyze and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More 24 Nov 2020News.Titus 7 technologies to help your business with GDPR complianceTeam Titus · Monday, November 23rd, 2020 In today’s global economy, businesses must be compliant with standards established by various Read More 24 Nov 2020BeyondTrust.News How Do the 10 Top Privileged Identity Management (PIM) Vendors Stack Up? See Evaluation & Ranking | BeyondTrustHow Do the 10 Top Privileged Identity Management (PIM) Vendors Stack Up? See Evaluation & Ranking | BeyondTrust November 19, 2020 Open You Read More 23 Nov 2020NAKIVO.News SharePoint vs. SharePoint Online: A Full ComparisonNAKIVO Blog > NAKIVO Backup & Replication > SharePoint vs. SharePoint Online: A Full Comparison November 19, 2020 by Michael Bose Read More 23 Nov 2020McAfee.News What Truebill and Other Financial Apps Have in Common With EDRThen I got to thinking about these new apps that I can’t imagine why anyone would need to use – UNTIL I decided to try Read More 22 Nov 2020News.Press releases.ThreatQuotient The Integration Imperative for XDRThe Integration Imperative for XDR MARC SOLOMON In my previous blog, I talked about the need for a conduit between Extended Detection and Read More 22 Nov 2020FireEye.News FireEye is the Intelligent Choice for Symantec ReplacementStop breaches in their tracks Each desktop, laptop and server is a possible entry for a breach, leaving your data, customer information and Read More 21 Nov 2020Forcepoint.News There’s Still Time to Register for Next Week’s SD-WAN and SASE SummitLike other events over the last several months, this year’s Summit has gone fully digital so you can attend no matter where you are based. SD-WAN Read More 21 Nov 2020News.Opentext Why innovation must be the new reality for government IT from January 2021 It’s almost ten years since the failed launch of healthcare.gov. This event served to cruelly expose what Read More 21 Nov 2020Centrify.News Ping and Centrify – Layering Identity Security Into DevOps [Webinar November 18]As has been well documented, security is often not the main focus for DevOps. The restrictions created by traditional methods of securing Read More 20 Nov 2020FireEye.News Purgalicious VBA: Macro Obfuscation With VBA PurgingMalicious Office documents remain a favorite technique for every type of threat actor, from red teamers to FIN groups to APTs. In this blog post, Read More 20 Nov 2020Micro Focus.News Smart changes in storeIntroduction A recent Forbes article commented, “COVID-19 will be remembered for many things and what’s becoming indisputable is how it is Read More 19 Nov 2020cPacket Networks.News cPacket Networks Deepens Cloud Offering with AWS Gateway Load BalancerThe post cPacket Networks Deepens Cloud Offering with AWS Gateway Load Balancer appeared first on cPacket Networks.Read More 19 Nov 2020Carbon Black.News VMware Carbon Black Announces Splunk Integration to Streamline and Modernize SOC WorkflowsIntroducing Unified VMware Carbon Black Cloud App for Splunk At VMware Carbon Black, our ecosystem of integration and alliance partners has Read More 19 Nov 2020Gartner.McAfee.News McAfee MVISION Solutions Meet FedRAMP Cloud Security RequirementsThis FedRAMP Moderate designation is equivalent to DoD Impact Level 2 (IL2) and certifies that the McAfee solution has passed rigorous security Read More 18 Nov 2020FireEye.News Find and Verify Threats in Splunk Phantom With FireEye Detection On DemandThreats can and do come from everywhere, and every organization approaches security differently based on their needs, industry and environment. Read More 18 Nov 2020Checkmarx.News Apache Unomi CVE-2020-13942: RCE Vulnerabilities DiscoveredGiven that Unomi contains an abundance of data and features tight integrations with other systems, making it a highly desired target for Read More 18 Nov 2020News.Riverbed Maximizing Network and Application Visibility and Performance | RiverbedNow as most IT professionals will attest, that’s not an easy thing to do, especially in complex hybrid cloud environments. But that’s where Read More 18 Nov 2020News.Riverbed Maximizing Network and Application Visibility and Performance | RiverbedWhen I joined Riverbed in October 2019, one of my first priorities was to present a clear vision and strategy for the company going into 2020. Read More 18 Nov 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week ending November 13, 2020Cofense solutions enable organizations to identify, analyze, and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More 17 Nov 202021 Jan 2021I4P.News i4p’s participation at RISK 2020It was a pleasure to have participated at REAL security’s RISK conference 2020. This leading IT security event for the Adriatic region went Read More 17 Nov 2020Forcepoint.Gartner.News Forcepoint Recognized by Gartner for 4th Straight Year as a Visionary in Network FirewallsWe designed Forcepoint NGFW to help enterprises and government agencies securely connect their offices, branches, private clouds and other sites Read More 17 Nov 2020BeyondTrust.News Stop Ransomware Attacks like RYUK with a Preventative Endpoint Security Approach | BeyondTrustStop Ransomware Attacks like RYUK with a Preventative Endpoint Security Approach | BeyondTrust November 16, 2020 Open You May Also Be Interested Read More 17 Nov 2020News.Qualys An End-to-End Approach to Next-Gen Web Application and API SecurityIt was almost 10 years ago that Marc Andreessen wrote that software is eating the world. It is still true today, but I would be even more Read More 17 Nov 2020Centrify.News Simplifying Access to Servers Using Tools You Are Familiar WithProviding privileged access to servers can be challenging, given the requirements to both grant access to authorized IT staff as well as protect Read More 16 Nov 2020Gartner.McAfee.News SOCwise: A Security Operation Center (SOC) Resource to BookmarkMeet the SOCwise From Michael Leland, Technical Director of Security Operations, McAfee From the perspective of a ‘legacy SIEM’ guy I Read More 15 Nov 2020News.ThreatQuotient The Term “Threat Intelligence” is Poisoned. It Does Not Mean What You Think it Means.I’m guessing the creators of the movie The Princess Bride had no idea that Inigo Montoya’s quote – You keep Read More 14 Nov 2020Forcepoint.News Future Insights – The Rise of Insider Threat-as-a-ServiceWhen envisioning the threats to your organization, malicious nation states or greedy virtual thieves located halfway around the world might loom Read More 14 Nov 2020News.Opentext 5 Content Suite and Extended ECM highlights from OpenText World 2020OpenText™ World 2020 offered insights from leading experts to help rethink the challenges facing your business. Learn how to best harness Read More 13 Nov 2020FireEye.News A Global Reset: Cyber Security Predictions 2021For most of us, 2020 was one of the most challenging years in recent memory. We struggled to deal with big changes in our personal lives and were Read More 12 Nov 2020Carbon Black.News VMware Carbon Black Named a Finalist in the 2020 CRN Tech Innovator AwardsWe are proud to announce that CRN®, a brand of The Channel Company, has named VMware Carbon Black a finalist in the 2020 CRN Tech Innovator Read More 12 Nov 2020McAfee.News How CASB and EDR Protect Federal Agencies in the Age of Work from HomeMcAfee’s global network of over a billion threat sensors affords its threat researchers the unique advantage of being able to thoroughly Read More 11 Nov 2020Checkmarx.News Checkmarx Solutions Now Available for Purchase on AWS MarketplaceIn case you’re unfamiliar, AWS Marketplace is a curated, digital catalogue that helps customers around the globe find, buy, and use third-party Read More 11 Nov 2020Ivanti.News November Patch Tuesday 2020Microsoft has released updates resolving a total of 112 unique common vulnerabilities and exposures (CVEs) this month. This puts us back up over Read More 11 Nov 2020Cofense.News Variants of Emotet MalwareThe Cofense Phishing Defense Center (PDC) team has seen a resurgence in the number of Emotet variants in the past few months, with the majority Read More 10 Nov 2020BeyondTrust.News Service Accounts – Don’t Overlook this Hidden Privilege Access Risk | BeyondTrustService Accounts – Don’t Overlook this Hidden Privilege Access Risk | BeyondTrust November 9, 2020 Open You May Also Be Interested In: Our Read More 10 Nov 2020News.Qualys The Evolution of the Qualys Cloud PlatformThe global pandemic has upended everything, and in the cyber security world in particular it has highlighted the need for organizations to have a Read More 10 Nov 2020Centrify.News Ephemeral Tokens vs. IDs and Passwords: A Simple Choice for DevOps?Static IDs and passwords have been around for decades, and for all the talk about getting rid of them, big pockets remain. Sure, for human login Read More 9 Nov 2020NAKIVO.News Everything You Wanted to Know about SharePointNAKIVO Blog > Office 365 Administration and Deployment > Everything You Wanted to Know about SharePoint November 9, 2020 by Michael Bose Read More 8 Nov 2020FireEye.News Ransomware: The Threat We Can No Longer Afford to IgnoreCybercrime is a billion-dollar industry that is consistently evolving. Innovation is at the heart of these criminal acts—hackers and fraudsters Read More 7 Nov 2020Forcepoint.News IDG Study – Protecting the Human Side of CybersecurityEmployees are Remote, Data is Everywhere According to a recent survey conducted in May 2020 by IDG of over 100 IT leaders, one major problem is Read More 7 Nov 2020News.Opentext Boost your digital fitness for cyber resilience in 2020 – and beyondDuring this tumultuous year, digital tools have let us keep working even as we’ve shuttered once-busy office spaces, moved by the millions Read More 7 Nov 2020Centrify.News Externalizing Credential Management for ITOM and ITSMOver the years, a pretty simple causality has emerged that represents one of the most significant security risks for organizations: PRIVILEGED Read More 6 Nov 2020FireEye.News Malicious File Transfer: What You Need To Know About an Attacker’s Methods and Techniques To Protect Your Organization From MalwareOne of the most effective ways for threat actors to infiltrate a network’s defenses is through the use of malware. As I discussed in our Security Read More 6 Nov 2020Micro Focus.News Micro Focus is Strategically Winning!How do we measure how strategic we are to our customers? Micro Focus uses double-blind competitive benchmarking in order to gauge how well we are Read More 5 Nov 2020Carbon Black.News.Webinars Countering a Home Invasion: Modernizing Threat Hunting Best PracticesThe recently released VMware Carbon Black Global Incident Threat Report found that incidents of counter incident response (IR) are occurring in Read More 5 Nov 2020McAfee.News.Webinars SPOTLIGHT: Women in CybersecurityThe RSA Conference USA 2019 held in San Francisco — which is the world’s largest cybersecurity event with more than 40,000 Read More 5 Nov 2020Allied Telesis.News Technology Surges Due to COVID-19Technology in healthcare often refers to cutting-edge treatments, or advanced, top-of-the-line medical devices and procedures. The COVID-19 Read More 4 Nov 2020FireEye.News Live off the Land? How About Bringing Your Own Island? An Overview of UNC1945Through Mandiant investigation of intrusions, the FLARE Advanced Practices team observed a group we track as UNC1945 compromise managed service Read More 4 Nov 2020Checkmarx.News Erez Yalon: A Security Leader in the API EconomyTo spread awareness around API risks and encourage developer secure coding practices when using APIs, Erez Yalon, Checkmarx’s Director of Read More 4 Nov 2020Cofense.News At the User’s Expense: Threat Actors Weaponize Companies’ Employee Reimbursements During the PandemicWith the health crisis that is COVID-19, employees are dutifully working from home. While some already had home offices decked out with dual Read More 3 Nov 2020BeyondTrust.News Top Cybersecurity Trends tor 2021: The Hacking of Time, M/L Data Poisoning, AI Attacks, & More | BeyondTrustTop Cybersecurity Trends tor 2021: The Hacking of Time, M/L Data Poisoning, AI Attacks, & More | BeyondTrust October 27, 2020 Open You May Read More 3 Nov 2020News.Riverbed Network Visibility’s Impact on Performance, Productivity and Security | Federal Government IT Study | RiverbedEvery federal IT manager wants to deliver the best end-user experience for their employees and agency, including a reliable network Read More 2 Nov 2020NAKIVO.News A Sysadmin’s Worst NightmaresNAKIVO Blog > NAKIVO Backup & Replication > A Sysadmin’s Worst Nightmares October 30, 2020 by Grace Norman Feeling like the world is Read More 2 Nov 2020Gartner.McAfee.News McAfee Named a Leader in the 2020 Gartner Magic Quadrant for CASBCloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and Read More 1 Nov 2020Gartner.News.Press releases.ThreatQuotient From the Trenches, Part 2: Working with Employees to Strengthen Security PostureFrom the Trenches, Part 2: Working with Employees to Strengthen Security Posture Liz Bush During COVID-19 and the shift to a remote work Read More 1 Nov 2020FireEye.News Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening, and ContainmentUPDATE (Oct. 30, 2020): We have updated the report to include additional protection and containment strategies based on front-line visibility and Read More 31 Oct 2020Forcepoint.News Cybercriminals Exploit Brazil’s PIX Instant Payment Platform in New Phishing AttackThe largest campaign we have uncovered, with over 4,000 phishing emails sent (and blocked by Forcepoint Email Security) on 21st October 2020, Read More 31 Oct 2020News.Opentext Join us for OpenText Enfuse On AirEnfuse On Air 2020 is the premier conference focused on prevention, detection and investigation of threats. Every Tuesday between November Read More 30 Oct 2020FireEye.News Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware ChaserThroughout 2020, ransomware activity has become increasingly prolific, relying on an ecosystem of distinct but co-enabling operations to gain Read More 30 Oct 2020Micro Focus.News Plotting your DX strategy in the new normalDX: Get Serious Have you seen the pandemic internet joke? It asks, “Who has driven Digital Transformation the most?” Options A and B are CEO and Read More 29 Oct 2020Carbon Black.News Cybersecurity Awareness Month: 2020 in RetrospectFor cyber defenders worldwide, 2020 has been unprecedented year. CISOs and their security teams have battled increased attack volumes and data Read More 28 Oct 2020FireEye.News Endpoint Security on the Developer HubGreat news: FireEye Endpoint Security is now available on the Developer Hub! Head over to the Developer Hub page now to explore the Endpoint Read More 28 Oct 2020Checkmarx.News Cybersecurity Awareness Month Week 4: Day in the Life, Software DeveloperWe’ve covered a lot of ground, but one area we haven’t hit on quite yet is the developer side of things. In today’s modern DevOps world, Read More 28 Oct 2020Cofense.News Purchase Order Phishing, the Everlasting Phishing TacticThe PDC team has seen a recent up-tick in legitimate Mimecast services being used as a vector for phishing campaigns found in environments Read More 27 Oct 2020News.Titus Budget-squeezed organizations face greater data security risksHow Titus and HelpSystems helps solve your data security needs Team Titus · Thursday, October 22nd, 2020 Organizations are more at risk Read More 27 Oct 2020Forcepoint.News Zero Trust Network Access (ZTNA): The cure for the common VPNVPNs and users don’t mix well That approach had been okay for small numbers of people working outside an office. But when everybody suddenly had Read More 27 Oct 2020BeyondTrust.News IT Security Leaders Share Scary Cybersecurity Tales & Cyberthreat Hobgoblins that Haunt their Sleep | BeyondTrustIT Security Leaders Share Scary Cybersecurity Tales & Cyberthreat Hobgoblins that Haunt their Sleep | BeyondTrust October 23, 2020 Open You Read More 27 Oct 2020News.Qualys NSA Alert: Chinese State-Sponsored Actors Exploit Known VulnerabilitiesOn October 20, 2020, the United States National Security Agency (NSA) released a cybersecurity advisory on Chinese state-sponsored malicious Read More 26 Oct 202026 Oct 2020News.RISK conference RISK 2020 letos v VIRTUALNI obliki!Spoštovani, vljudno vabljeni na največjo konferenco o informacijskim varnosti in novih tehnologijah v regiji Adriatik, RISK 2020, ki bo letos Read More 26 Oct 202026 Oct 2020News.RISK conference RISK 2020 this year in full VIRTUAL format!Dear, You are cordially invited to the largest conference on information security and new technologies in the Adriatic region, RISK 2020, which Read More 26 Oct 2020McAfee.News Data-Centric Security for the Cloud, Zero Trust or Advanced Adaptive Trust?Today, most entities utilize a multi-phased security approach. Most commonly, the foundation (or first step) in the approach is to implement Read More 25 Oct 2020Gartner.News.Press releases.ThreatQuotient Do Your Part to Stay Safe Online and Start Using a Password ManagerDo Your Part to Stay Safe Online and Start Using a Password Manager Aaron Louks Cybersecurity Awareness Month 2020 is about taking proactive Read More 25 Oct 2020FireEye.News Flare-On 7 Challenge SolutionsWe are thrilled to announce the conclusion of the seventh annual Flare-On challenge. This year proved to be the most difficult challenge we’ve Read More 24 Oct 2020Forcepoint.News Everything You Need to Know About the Cyber Voices Zero Trust SummitIf you’re a security leader for your organization, chances are good you’re at some point along a digital transformation journey that’s focused on Read More 24 Oct 2020News.Opentext OpenText World 2020—Are You Ready for the Great Rethink?The world is not changing. It has changed. These changes are deep. Structural. Lasting. We must use this opportunity to rethink on a massive Read More 23 Oct 2020FireEye.News Threats Targeting VoIP Networks as Usage Surges During PandemicInternet service providers are seeing a spike in Voice over Internet Protocol (VoIP) usage driven by the increased adoption of working from home Read More 23 Oct 2020Micro Focus.News INSPIRE 20 – mark my words! The importance of diverse tech innovationUKBlackTech All I can say about this week’s episode is WOW, Mark Martin, what an episode! Mark, a computer science teacher and founder of Read More 22 Oct 2020Carbon Black.News Crossing the Narrow SeaTom Kellermann, Head of Cybersecurity Strategy at VMware and Member of the Cyber Investigations Advisory Board of the United States Secret Read More 22 Oct 2020McAfee.News The Deepfakes Lab: Detecting & Defending Against Deepfakes with Advanced AIDeepfakes began to gain attention when a fake pornography video featuring a “Wonder Woman” actress was released on Reddit in late Read More 21 Oct 2020FireEye.News The Inception of Mandiant AdvantageOur customers expressed a desire for faster access to our intelligence to focus on threat activity that matters to them, so we launched Mandiant Read More 21 Oct 2020Checkmarx.News Cybersecurity Awareness Month Week 3: Day in the Life, AppSec EducatorIn the security industry, enough can’t be said about the need for spreading awareness. It’s the first, and most critical, step in spurring action Read More 21 Oct 2020Cofense.News Mandatory Internal Company Communications: The Best Time to PhishCompanies are awash with numerous corporate communications: open enrollment notifications, new policies and so forth. With this crush of Read More 20 Oct 2020BeyondTrust.News Understanding Authentication vs. Authorization | BeyondTrustUnderstanding Authentication vs. Authorization | BeyondTrust October 19, 2020 Open You May Also Be Interested In: Our website uses cookies to Read More 20 Oct 2020News.Qualys Qualys Policy Compliance Plugin for Jenkins Now AvailableVarious factors may introduce vulnerabilities in a product during its lifecycle, resulting in a drift from the required compliance status. Hence, Read More 19 Oct 2020NAKIVO.News Common Office 365 Issues and How to Solve ThemNAKIVO Blog > Office 365 Administration and Deployment > Common Office 365 Issues and How to Solve Them October 19, 2020 by Michael Bose Read More 19 Oct 2020News.ThreatMark Product Release 3.27 – Improved Bot detection, introduction to async large batch payments scoring, and the new ThreatMark AFS PanelThere’s been a lot of great work done by our team that just gets confined to our own company. Until now, we haven’t communicated out product Read More 19 Oct 2020Certgate Blurtooth Security Issue? AirID is safe!Blurtooth security vulnerability? AirID is safe – Blurtooth has no chance with AirID. Düsseldorf, 21.09.2020, certgate, one of Read More 18 Oct 2020News.ThreatQuotient Is Scaling a Pyramid on Your Bucket List? It Should BeThe concept of “The Pyramid of Pain” was first introduced by David J. Bianco in 2013. Today, most security professionals are familiar Read More 18 Oct 2020FireEye.News Windows Event Streaming Using FireEye Endpoint and HelixGathering Microsoft Windows event logs is a critical function of most SOCs. The wealth of information available on endpoints makes ingesting logs Read More 18 Oct 2020News.Versasec Versasec expands Windows Hello for BusinessDate: 2020-10-12Author: Anders Adolfsson, Versasec Technical Consultant Previous << VISA 1FA EMV In Microsoft Windows 10, Windows Hello for Read More 18 Oct 2020News.Riverbed Enabling Work-From-Anywhere | Application and Network Performance | RiverbedIn Part 1 and Part 2 of this blog series, we established that forward-thinking organizations are prioritizing technology investments to ensure Read More 17 Oct 2020Forcepoint.Gartner.News Future Insights – The Emergence of the Zoom of CybersecurityThis is the status quo today: We have all moved to remote working. Cloud deployment is a necessity. Digital transformation has happened—and where Read More 17 Oct 2020Indeed Identity.News Webinar: 5 coolest features every access management software should haveWhat if you’ve had one tool for managing access of employees and customers? Or a tool providing strong and multi-factor authentication with Read More 17 Oct 2020News.Opentext A little knowledge is a dangerous thing…In today’s world, everything moves so fast. Everyone wants something yesterday. Everyone demands and expects more from Read More 16 Oct 2020FireEye.News FIN11: Widespread Email Campaigns as Precursor for Ransomware and Data TheftMandiant Threat Intelligence recently promoted a threat cluster to a named FIN (or financially motivated) threat group for the first time since Read More 15 Oct 2020Carbon Black.News Ransomware Attacks Targeting Healthcare Surge: VMware Carbon Black experts Weigh inTargeted, sophisticated, and costly – over the past month, several high-profile ransomware attacks have been reported with a specific focus Read More 15 Oct 2020McAfee.News.Webinars “Best of Breed” – CASB/DLP and Rights Management Come TogetherEnter the cloud Most organizations now consider cloud services to be essential in their business. Services like Microsoft 365 (Sharepoint, Read More 14 Oct 2020FireEye.News Threat Found: Integrating With FireEye Detection On DemandThreats can and do come from everywhere, and every organization approaches security differently based on their needs, industry and environment. Read More 14 Oct 2020Checkmarx.News Cybersecurity Awareness Month Week 1: Day in the Life, Security ResearcherHave you ever wondered what a typical day looks like for a security researcher? If so, you’ve come to the right place! We’re kicking things off Read More 14 Oct 2020Cofense.News Security Awareness: Choosing Methods and Content that WorkLast week we examined the importance of setting a strategy and goals for your security awareness program. Part 2 in our 4-part series in support Read More 13 Oct 2020Forcepoint.News Shifting Gears from IOCs to IOBsThe after-the-fact nature of IOCs is one of their clearest limitations. They are documentation artifacts (hash of a file, reputation of an IP, Read More 13 Oct 2020BeyondTrust.News BeyondTrust Expands Cloud Leadership with Password Safe SaaS | BeyondTrustBeyondTrust Expands Cloud Leadership with Password Safe SaaS | BeyondTrust Join Us for Go Beyond – Our Virtual Customer Conference October Read More 12 Oct 2020NAKIVO.News How to Migrate from G Suite to Office 365 and Why You Need ItNAKIVO Blog > Office 365 Administration and Deployment > How to Migrate from G Suite to Office 365 and Why You Need It October 8, 2020 by Read More 11 Oct 2020Gartner.News.Press releases.ThreatQuotient ThreatQuotient Listed in Gartner’s 2020 Market Guide for Security Orchestration, Automation and Response SolutionsThreatQ platform’s data-driven approach to SOAR can free-up two to three full-time security analysts for higher level tasks Reston Va. Read More 11 Oct 2020FireEye.News Mandiant Executive Intelligence Briefing: Election Security EditionWith less than a month before the U.S. elections on Nov. 3, the race is on to protect the democratic process. Mandiant Threat Intelligence is Read More 11 Oct 2020Ivanti.News Coffee Talk With Ivanti Insiders on International Coffee DayName What is your favorite coffee drink? How do you take your coffee? What is your favorite fall/winter coffee drink? Favorite snack to have with Read More 10 Oct 2020Forcepoint.News Five Takeaways to Build a Resilient Cybersecurity Strategy1. Enable remote classified access With people as the new perimeter, cross domain solutions provide remote classified access, while Zero Trust Read More 10 Oct 2020News.Opentext Forrester: What to look for in cloud content management vendors This blog is co-authored by Alison Clarke and Sandi Nelson. Having the right partners by your side is crucial as your organization digitally Read More 9 Oct 2020FireEye.News Gartner: 5 Things You Must Absolutely Get Right for Secure IaaS and PaaSEvery organization is adopting the cloud in one way or another, and for good reason. The cloud offers many benefits, but it also comes with a new Read More 9 Oct 2020Micro Focus.News INSPIRE 20 – the secret diary of a security event crasher….Hacky-sec It’s time for one of my favorite days of the week – INSPIRE 20 podcast day! Today we are joined by the exceptional Tanya Janca, aka Read More 8 Oct 2020Carbon Black.News.Webinars Cybersecurity Awareness Month 2020: Top Resources on “If You Connect it, Protect it”Leaves are turning red and gold, the temperature is dropping, and the smell of pumpkin spice is filling the air. It’s officially October! Read More 8 Oct 2020McAfee.News MITRE ATT&CK for Cloud: Adoption and Value Study by UC Berkeley CLTCBackground Nearly all enterprises and public sector customers we work with have enabled cloud use in their organization, with many seeing a Read More 7 Oct 2020FireEye.News Introducing Mandiant Advantage: Threat Intelligence — Know the Threats That Matter Most To YouWhen it comes to cyber security, many organizations remain reactive. Cyber security becomes a top priority only when a breach occurs, or critical Read More 7 Oct 2020Checkmarx.News Expert Q&A on Securing Code in GitHub with CheckmarxWe sat down with Ken McDonald, Principal Integrations Engineer at Checkmarx, to learn more about how Checkmarx’s new GitHub Action works and how Read More 7 Oct 2020Armis.News 5 Questions CISOs Must Ask When Addressing the New WFH RealityIf you’re like me, your professional life has changed dramatically over the last six months and you’re likely working from home every day. Read More 7 Oct 20207 Oct 2020Armis.News Armis Recognized as a Leader in Connected Medical Device Security EvaluationWe are ecstatic that Armis has been named a Leader in The Forrester New Wave™: Connected Medical Device Security Q2 2020 report. Forrester Read More 7 Oct 2020Cofense.News Twelve Flavors of Phish: Canadian Workers Targeted With Fake Covid-19 Relief DepositsFinancial aid programs continue to be popular targets in the midst of the COVID-19 pandemic, with government relief grants a Read More 6 Oct 2020Forcepoint.Gartner.News Actionable Insights: The Disruption of Behavioral AnalyticsThe Broken Promise of Behavioral Analytics Dynamic User Protection IOB Overview Applied behavioral analytics have fallen short in terms of Read More 6 Oct 2020BeyondTrust.News Why Privilege Management is at the Center of Modern Endpoint Security | BeyondTrust3. Use Pragmatic Application Control & Block Malicious Code [Endpoint Privilege Management] By layering modern application control on top of Read More 6 Oct 2020News.Qualys Instrument VMware Virtual Machines for Security and ComplianceHow do you ensure Qualys is managing the security and compliance of all your VMware workloads? First, you need to have Qualys Cloud Agent Read More 5 Oct 2020NAKIVO.News How to Back Up OneDrive for Business with NAKIVO Backup & ReplicationNAKIVO Blog > Office 365 Administration and Deployment > How to Back Up OneDrive for Business with NAKIVO Backup & Replication Read More 5 Oct 2020McAfee.News McAfee Leapfrogs Competition with trio of awards at 2020 IT World AwardsThe IT World Awards are industry and peer recognitions from Network Products Guide honoring achievements of world’s best in organizational Read More 4 Oct 2020LOGbinder.News Today we revolutionize using Windows Event Collection at scaleWhat we are announcing today with Supercharger for Windows Event Collection reminds me of how far technology has come. I remember being so Read More 4 Oct 2020News.Press releases.ThreatQuotient.Webinars 5 Tips You Can Start Using Today to Reduce Business Risk5 Tips You Can Start Using Today to Reduce Business Risk POSTED BY ANDY GEPERT Cyber threat intelligence (CTI), risk management and privacy teams Read More 4 Oct 2020FireEye.News Back to School: The Cyber Workforce in 2020The cyber skills shortage is a real problem. There just aren’t enough qualified people to adequately meet the cyber security needs of all Read More 3 Oct 2020Forcepoint.News Our Cyber Voices Zero Trust Summit is Just a Few Weeks AwayIf you’re a business leader, a security executive or a security team lead or practitioner, you’ll leave this half-day virtual summit with a Read More 3 Oct 2020News.Opentext Running a resilient EIM platformInformation is key for businesses to operate and succeed, making it imperative that the Enterprise Informant Management platforms they rely on Read More 3 Oct 2020Centrify.News How to Empower the “Sec” in DevSecOpsIn this blog, I’m going to talk about Privileged Access Management (PAM) for security in a modern DevOps world. A very frustrating topic for Read More 3 Oct 2020News.Riverbed Perfect Forward Secrecy (PFS) API and SSL/TLS Analysis | AppResponse 11.10 | RiverbedKeeping track of SSL and TLS security certificates is important. An expired certificate can erode trust in your organization in that customers Read More 2 Oct 2020FireEye.News Detecting Microsoft 365 and Azure Active Directory BackdoorsMandiant has seen an uptick in incidents involving Microsoft 365 (M365) and Azure Active Directory (Azure AD). Most of these incidents are the Read More 2 Oct 2020News.PROFITAP Monitoring Remote Sites with IOTAThe majority of the organizations today are highly distributed, with systems and data scattered across several locations. Whether it’s Read More 1 Oct 2020Carbon Black.News Intrinsic Security at VMworld 2020VMworld 2020 kicked off today and for the first time ever, hundreds of security experts took the virtual stage to unveil Read More 30 Sep 2020FireEye.News In Pursuit of a Gestalt Visualization: Merging MITRE ATT&CK® for Enterprise and ICS to Communicate Adversary BehaviorsUnderstanding the increasingly complex threats faced by industrial and critical infrastructure organizations is not a simple task. As Read More 30 Sep 202030 Sep 2020Netwrix.News Data Privacy Solutions: How to Choose the Right OneData privacy solutions are crucial for complying with privacy regulations and maintaining security. In the first nine months of 2019, there were Read More 30 Sep 2020Checkmarx.News Remarkable University Study About Real-World Cybersecurity TrainingMost would agree that the best way to train someone is while they’re doing the activity themselves. For example, if someone wanted to train for a Read More 30 Sep 2020Cofense.News You Can Respond to Phishing Threats in Seconds with Cofense and Cyware: Here’s HowAll organizations will be phished, but they don’t have to experience a reputation-damaging breach. The best defense is a combination of aware Read More 29 Sep 2020Forcepoint.News.Webinars Webinar: CISO Strategy for the CloudThe cloud changes our approach to cybersecurity on so many levels—it introduces new technologies and technical complexities, presents us with a Read More 29 Sep 2020BeyondTrust.News Protecting Against PowerShell Attacks: 5 Key Steps | BeyondTrustProtecting Against PowerShell Attacks: 5 Key Steps | BeyondTrust September 23, 2020 Open You May Also Be Interested In: Our website uses cookies Read More 29 Sep 2020News.Qualys PAN-OS Critical Buffer Overflow Vulnerability (CVE-2020-2040) – Automatically Discover, Prioritize and Remediate Using Qualys VMDR®On Sept 9, 2020, Palo Alto Networks published nine security bulletins addressing vulnerabilities in PAN-OS operating system versions 8.0 or Read More 28 Sep 2020NAKIVO.News How to Configure an Out of Office Notification in Office 365NAKIVO Blog > NAKIVO Backup & Replication > How to Configure an Out of Office Notification in Office 365 September 25, 2020 by Michael Read More 27 Sep 2020News.Press releases.ThreatQuotient ThreatQuotient Celebrates World Rhino Day 2020 With Ongoing Support for Helping RhinosCybersecurity startup’s rhino conservation efforts have expanded to include three additional rhino adoptions and a Black Mamba sponsorship Read More 27 Sep 2020FireEye.News Ransomware and Observations from Recent IR InvestigationsRansomware continues to be one of the most significant cyber security issues affecting organizations today. The attack is very effective and can Read More 26 Sep 2020Forcepoint.News Government Organizations Must Rein in Privileged UsersIn surveying nearly 900 self-described privileged users—those who have higher-level access than your standard employee—in UK and US government, Read More 26 Sep 2020News.Opentext Getting the best performance from your Digital Asset Management systemPerformance is an essential component when implementing any solution and is critical for acceptance by the end users, administrators, consumers, Read More 25 Sep 2020FireEye.News Fuzzing Image Parsing in Windows, Part One: Color ProfilesImage parsing and rendering are basic features of any modern operating system (OS). Image parsing is an easily accessible attack surface, and a Read More 24 Sep 2020Carbon Black.News Detecting Threats in Real-time With Active C2 InformationOften security practitioners rely on the reputation of IP Addresses to determine if traffic to and from that IOC is malicious. In practice, the Read More 24 Sep 2020Backbox.News BackBox joins Cisco Security Technology Alliance (CSTA)BackBox joins Cisco Security Technology Alliance (CSTA) BackBox is excited to announce that it has joined the Cisco Security Technology Alliance Read More 24 Sep 2020McAfee.News MVISION Cloud for Microsoft TeamsWorking from home has become a new reality for many, as more and more companies are requesting that their staff work remotely. Already, we Read More 24 Sep 2020Allied Telesis.News Wi-Fi 6 – The Bare FactsThe latest wireless standard, 802.11ax (more commonly known as Wi-Fi 6), is about to be ratified by the IEEE and offers the potential for Read More 23 Sep 2020FireEye.News Uniting Security Superpowers: Mandiant Solutions and Microsoft Working Together for Better Security Outcomes“If everyone is moving forward together, then success takes care of itself.” — Henry Ford Regardless of industry, geography or Read More 23 Sep 2020Checkmarx.News Post-Pandemic Responsibilities for a Modern Day CISOAs organizations worldwide adjust to what’s being called the “new normal,” especially in the digital context, roles, and responsibilities of all Read More 23 Sep 2020Cofense.News Virtual Submerge is off to a roaring start.Here are a few quick highlights from day one. Judging from attendee feedback, it was a very good day one. And it’s not too late to join us for Read More 22 Sep 2020Forcepoint.News.Webinars Frost & Sullivan and Forcepoint Asia Pacific Risk & Cybersecurity SurveyFrost & Sullivan conducted a survey of 400 Asia Pacific (APAC) IT leaders in Australia, India, Singapore and Hong Kong to understand the Read More 22 Sep 2020BeyondTrust.News How a Major University is Securing Its Remote & On-Premise Workforces with Privilege Management | BeyondTrustHow a Major University is Securing Its Remote & On-Premise Workforces with Privilege Management | BeyondTrust September 21, 2020 Open You May Read More 22 Sep 2020News.Qualys Unified Dashboard for Enhanced Security VisualizationQualys has introduced a new app named Unified Dashboard (UD) to enrich your dashboarding experience. Unified Dashboard (UD) brings information Read More 21 Sep 2020NAKIVO.News NAKIVO Backup & Replication v10.1: What’s New?NAKIVO Blog > NAKIVO News > NAKIVO Backup & Replication v10.1: What’s New? September 21, 2020 by Grace Norman We’re excited to announce Read More 20 Sep 2020News.ThreatQuotient The Crucial Component of Detection and Response: Intelligence PivotingIntelligence Pivoting Allows You to Build a Broader Picture and is Pivotal to Detection and Response Pivot. It’s a word we’re hearing Read More 20 Sep 2020FireEye.News Ransomware Recon — Before the BreachNo one wants to see a repeat of last year’s string of ransomware attacks on municipalities where government services were offline for days, weeks Read More 19 Sep 2020News.Opentext Why small retailers are flocking to this EDI solutionWhy is Electronic Data Interchange (EDI) so important to small to medium sized businesses (SMBs) and why is it quickly becoming a necessity? Read More 18 Sep 2020FireEye.News APT41: A Dual Espionage and Cyber Crime OperationToday, FireEye Intelligence is releasing a comprehensive report detailing APT41, a prolific Chinese cyber threat group that carries out Read More 18 Sep 2020News.Riverbed Synthetic Application Monitoring | 5 Key Benefits of Synthetic Monitoring for Modern Applications | RiverbedBefore we get into the benefits of synthetic monitoring, let’s start by defining it. Synthetic monitoring is a method used to monitor Read More 18 Sep 2020News.Riverbed Synthetic Application Monitoring | 5 Key Benefits of Synthetic Monitoring for Modern Applications | RiverbedBefore we get into the benefits of synthetic monitoring, let’s start by defining it. Synthetic monitoring is a method used to monitor Read More 18 Sep 2020Micro Focus.News Software Audits During a PandemicThe letter of the law Virtually anyone who has worked in IT over a meaningful period of time has experienced a software audit, which is sometimes Read More 17 Sep 2020Carbon Black.News Top Three Demos at VMworld 2020: Security, Threat Hunting, and BeyondVMworld 2020 (Sept. 29- Oct. 1) is fast approaching. This year, and for the first time ever, VMworld will Read More 16 Sep 2020FireEye.News A “DFUR-ent” Perspective on Threat Modeling and Application Log Forensic AnalysisMany organizations operating in e-commerce, hospitality, healthcare, managed services, and other service industries rely on web applications. And Read More 16 Sep 2020Checkmarx.News Application Security: Turbulence Often Leads to TransformationThe COVID-19 pandemic is inescapably modifying working conditions, forcing unwanted budget cuts, altering the broad terrain of security Read More 16 Sep 2020Cofense.News Phish Fryday – Phishing FinanceWe use our own and third-party cookies to enhance your experience by showing you relevant content, personalizing our communications with you, and Read More 15 Sep 2020News.Titus Choosing a remote workforce protection solution: What the experts are sayingHome » Blog » Choosing a remote workforce protection solution: What the experts are saying Team Titus · Wednesday, September 9th, 2020 Read More 15 Sep 2020Forcepoint.News Join Us September 24 for our Government at the Edge 2020 Cybersecurity SummitAs an industry we are learning many important lessons as we plan for what cybersecurity should look like in this new era. Agencies need to plan Read More 15 Sep 2020BeyondTrust.News Which Windows Server Events Should You Monitor and Why? | BeyondTrustWhich Windows Server Events Should You Monitor and Why? | BeyondTrust September 9, 2020 Open You May Also Be Interested In: Our website uses Read More 15 Sep 2020News.Qualys September 2020 Patch Tuesday – 129 Vulnerabilities, 23 Critical, SharePoint, Exchange, Windows Codecs, Adobe VulnsThis month’s Microsoft Patch Tuesday addresses 129 vulnerabilities with 23 of them labeled as Critical. The 23 Critical vulnerabilities cover Read More 14 Sep 2020Micro Focus.News Micro Focus is A1 for Ease of Doing Business with…helping to rock the Net Promoter®How do we Measure easy to do business with? Micro Focus uses double-blind competitive benchmarking in order to gauge how well we are doing Read More 13 Sep 2020News.Press releases.ThreatQuotient.Webinars CTI Recommendations from a Panel of ExpertsCTI Recommendations from a Panel of Experts POSTED BY ANDY GEPERT In the last few years, Cyber Threat Intelligence (CTI) has matured into a Read More 13 Sep 2020News.Versasec VISA 1FA EMVDate: 2020-09-08Author: Martin Scholz, Versasec R&D Manager Previous << NIST ZTA Using strong authentication, two-factor authentication Read More 12 Sep 2020Forcepoint.News Forcepoint Engineer Plays Role in UK Study of Neurological Impact of COVID-19In June, we were able to present our findings from the first systematic, nationwide UK surveillance study of the breadth of acute complications Read More 12 Sep 2020News.Opentext How to select the best digital fax provider in 2020Fax has been the secure communications lifeblood of organizations across industries for decades, but the technology has evolved far beyond Read More 11 Sep 2020Ivanti.News What Is IT Asset Management?Even though ITAM has been around for a long time, there are still some very loose interpretations that claim to define IT asset management Read More 11 Sep 2020Micro Focus.News Who are the most innovative companies?New kids on the block or old-timers? People often think that hot new tech startups, with their promises to revolutionize ________ (fill in the Read More 10 Sep 2020Carbon Black.News The U.S. Secret Service Selects Tom Kellermann to Serve on Inaugural Cyber Investigations Advisory BoardCybersecurity has become a recurring global news headline. From ransomware to data breaches, cyberattacks continue to be one of the biggest Read More 9 Sep 2020Checkmarx.News On the Road to DevSecOps: Security and Privacy Controls per NIST SP 800-53In the context of software security, in section SA-11, DEVELOPER TESTING AND EVALUATION beginning on page 267, this control requires the Read More 9 Sep 2020Cofense.News Message Quarantine Campaign with Overlying PotentialWe use our own and third-party cookies to enhance your experience by showing you relevant content, personalizing our communications with you, and Read More 8 Sep 2020BeyondTrust.Gartner.News Gartner 2020 Magic Quadrant & Critical Capabilities Reports for Privileged Access Management | BeyondTrustGartner 2020 Magic Quadrant & Critical Capabilities Reports for Privileged Access Management | BeyondTrust September 4, 2020 Open You May Read More 8 Sep 2020News.Qualys Detect FritzFrog and Other Malware Infections with Inventory DataRecently, Guardicore researchers discovered a new type of malware called “FritzFrog,” which targets multiple industry verticals, including Read More 7 Sep 2020NAKIVO.News Account-Level Calendar and Contacts Sharing for Office 365NAKIVO Blog > NAKIVO Backup & Replication > Account-Level Calendar and Contacts Sharing for Office 365 September 3, 2020 by Michael Read More 7 Sep 2020McAfee.News What A Threat Analyst Really Thinks of IntelligenceWhen I was a threat analyst, too long ago for me to actually put in writing, I remember the thrill of discovery at the apex of the boredom of Read More 6 Sep 2020News.Press releases.ThreatQuotient Are You Maximizing MITRE ATT&CK? Insights from the new SANS Whitepaper Will HelpAre You Maximizing MITRE ATT&CK? Insights from the new SANS Whitepaper Will Help POSTED BY LIZ BUSH The MITRE ATT&CK framework has become Read More 5 Sep 2020Forcepoint.News Customer Outcomes and End-User Experience Matter More Than Raw Numbers for Cloud ServicesThe center of data gravity has shifted from company-operated centralized datacenters to SaaS applications and cloud workloads and this poses new Read More 5 Sep 2020News.Opentext Building resilient digital supply chains in Japanese auto and manufacturingFor decades, the Japanese automotive and manufacturing industries have been the envy of the world. They have exported production models that Read More 4 Sep 2020FireEye.News The Cost Factor: Taking a Proactive Approach to Cyber Security ROISecurity teams are doing their best to keep employees online and secure during this extended period of working from home, but as we move towards Read More 4 Sep 2020Micro Focus.News Micro Focus Virtual Universe On-DemandThat was then Earlier this year, it what seems like many months ago, we had the pleasure of hosting nearly 4000 of our customers in our annual Read More 3 Sep 2020Carbon Black.News XDR DefinedThe EDR market is going through the biggest period of change and innovation now. Historically, endpoint detection and response Read More 2 Sep 2020FireEye.News Under the Influence: A Look at Modern Day Information OperationsInformation operations (IO) gained prominent public attention in 2016 during the U.S. general election. Since then, new campaigns have continued Read More 2 Sep 2020News.PROFITAP How to Troubleshoot Intermittent Problems?When it comes to solving network problems, intermittent problems are some of the toughest to resolve. It can take weeks for only trying to catch Read More 2 Sep 2020Cofense.News Phish Fryday – RansomwareWe use our own and third-party cookies to enhance your experience by showing you relevant content, personalizing our communications with you, and Read More 1 Sep 2020News.Titus Ep.7: Vinayak Godse (DSCI) – Titus Talks Cybersecurity PodcastJason Hodgert · Wednesday, August 26th, 2020 Our guest is Vinayak Godse, Vice President of Data Security Council of India (DSCI). Jason Read More 1 Sep 2020BeyondTrust.News BeyondTrust CEO Matt Dircks Named Finalist in EY Entrepreneur Of The Year® 2020, Southeast | BeyondTrustBeyondTrust CEO Matt Dircks Named Finalist in EY Entrepreneur Of The Year® 2020, Southeast | BeyondTrust August 26, 2020 Open You May Also Be Read More 1 Sep 2020News.Qualys Meow Attack: A Reminder for Organizations to Identify and Secure Their DatabasesThousands of unsecured internet-facing databases have fallen prey to the “Meow” attack and have been permanently destroyed. Meow attacks replace Read More 31 Aug 2020McAfee.News.Webinars Why Ransomware Targets No Longer Need to Wind Up as Ransomware VictimsBut being a target doesn’t mean you’re fated to become a victim. With the deployment of complete and proactive security software, organizations Read More 30 Aug 2020News.ThreatQuotient Putting the Pieces Together for Extended Detection and ResponsePulling the Right Data From the Right Tools Allows You to Validate a Detection and Respond Effectively The Data Breach Investigations Report Read More 30 Aug 2020FireEye.News Policy Evasion: Evasive Techniques You Need to Understand to Prevent Breaches and AttacksEvasive techniques are regularly used by cyber attackers to avoid detection and hide malicious activity, and they are quite effective too. In Read More 30 Aug 2020News.Versasec NIST Special Publication on Zero Trust ArchitectureDate: 2020-08-27Author: Joakim Thorén, CEO Previous << vSECCMS S5.8 The US National Institute of Standards and Technology (NIST) has Read More 29 Aug 2020Forcepoint.News In Case of Emergency: Securing “Break-the-Glass” Access ProtocolsIt’s never been more important for workers who are feeling sick to stay home, so many hospitals have faced staffing shortages that threaten to Read More 29 Aug 2020News.Opentext How a global research and manufacturing company achieves regulatory complianceAs a Contract Research and Manufacturing organization with over 330 clients around the globe, regulatory compliance is non-negotiable for Syngene Read More 29 Aug 2020Centrify.News Centrify Delegated Machine Credentials – Modern IAM for Machines and ServicesCentrify was founded on the idea of centralizing identity and access management across the heterogeneous enterprise within Active Directory. More Read More 28 Aug 2020FireEye.News Emulation of Malicious Shellcode With SpeakeasyIn order to enable emulation of malware samples at scale, we have developed the Speakeasy emulation framework. Speakeasy aims to make it as easy Read More 28 Aug 2020Micro Focus.News Post-Sales Support – Done Right For A Rocking Net Promoter®How do we Measure Post-Sales Support? Micro Focus uses double-blind competitive benchmarking in order to gauge how well we are doing against the Read More 27 Aug 2020Carbon Black.News Top Three Things I’m Looking Forward to at VMworld 2020VMworld 2020 (September 29 to October 1) is right around the corner. This year’s event is entirely virtual and offers a unique way for all Read More 27 Aug 2020Gartner.McAfee.News McAfee ESM Named a 2020 Gartner Peer Insights Customers’ Choice for SIEMWe are most appreciative of our customers who support our solutions and share their opinions through forums like Gartner Peer Insights. The voice Read More 26 Aug 2020FireEye.News A Hands-On Introduction to Mandiant’s Approach to OT Red TeamingOperational technology (OT) asset owners have historically considered red teaming of OT and industrial control system (ICS) networks to be too Read More 26 Aug 2020Checkmarx.News Integrating Checkmarx Security Results within GitLabAnnounced today, we’re thrilled to share that CxSAST, CxSCA, and CxCodebashing all now integrate seamlessly within GitLab’s ecosystem via CxFlow: Read More 26 Aug 2020Cofense.News Humans and Machines – Phishing Mitigation Automation SOARing to New HeightsCofense and Palo Alto Networks Cortex XSOAR integrate to counter phishing threats that evade secure email gateways (SEGs). Human-verified Read More 25 Aug 2020News.Titus Why Zero Trust is so hot right now – and how Titus helps make it happenHome » Blog » Why Zero Trust is so hot right now – and how Titus helps make it happen Matthew McCormick · Monday, August 24th, 2020 If Read More 25 Aug 2020Forcepoint.News Today’s Cybersecurity Challenges Require Professionals Who Understand What They’re Protecting and WhyAll of this makes it more critical than ever that the cybersecurity warriors inside your company understand how your business operates in order Read More 25 Aug 2020BeyondTrust.News macOS Security: Managing Privileged Access & Credentials | BeyondTrustmacOS Security: Managing Privileged Access & Credentials | BeyondTrust August 24, 2020 Open You May Also Be Interested In: Our website uses Read More 25 Aug 2020News.Qualys Automated Discovery and Assessment of PaaS Databases with Lambda Service for Qualys Policy ComplianceIn the last several years, Platform as a Service (PaaS) solutions have evolved and matured. As organizations have focused on digital Read More 24 Aug 2020Gartner.McAfee.News The Economic Benefits from McAfee’s UCE SolutionThe cloud transformation that we are seeing today is happening across several dimensions. Companies are rapidly moving from their private data Read More 23 Aug 2020Gartner.News.Press releases.ThreatQuotient Spike in Cloud Attacks Shows Businesses were not Prepared to Work from HomeSpike in Cloud Attacks Shows Businesses were not Prepared to Work from Home POSTED BY RYAN TROST Businesses continue to place more and more data Read More 23 Aug 2020FireEye.News How Strategic Intelligence Helps Organizations Make Sense of the Threat LandscapeThe Strategic Analysis team at Mandiant Threat Intelligence examines hundreds of discrete data points from numerous sources, distilling trends Read More 22 Aug 2020Forcepoint.News.Webinars A New Way to Think About Breach DetectionData breaches can cripple businesses. While it’s true the financial implications tend to be significant—both in terms of revenue loss and Read More 22 Aug 2020News.Opentext Keeping up the fight on cancer during pandemicIn just a few months, COVID-19 changed the world. Millions have been infected and hundreds of thousands have died at the time of writing. This Read More 22 Aug 2020Centrify.News Combat Data Breaches, Weak Passwords, and Phishing Attacks with Multi-Factor AuthenticationForrester Research has estimated that 80 percent of security breaches involve weak, default, stolen, or otherwise compromised privileged Read More 21 Aug 2020FireEye.News The FireEye Approach to Effective Cloud SecurityReports indicate that roughly 83% of workloads are in the cloud as of this year. That’s a lot of new real estate for attackers, and now is the Read More 21 Aug 2020Micro Focus.News INSPIRE 20 – Summer BreakWith five outstanding INSPIRE 20 podcasts under our belt, our team is taking a few weeks break to relax, refresh, and build up some more exciting Read More 20 Aug 2020Carbon Black.News Top Six VMworld 2020 Sessions and Activities for a Threat HunterI’m excited to be a part of VMworld 2020 as a speaker and as a member of VMware Carbon Black. This year at VMworld 2020, Read More 19 Aug 2020FireEye.News How Secure Is Your Remote Work Infrastructure?Most organizations couldn’t even conceive a completely remote workforce, but earlier this year the world experienced an unpredictable Read More 19 Aug 2020Checkmarx.News You Better Get Going with GoWell, this is basically my story too. I left Node.js as well, and now I use the Go Language (Golang, Go) as my backend technology of choice. Read More 19 Aug 2020Certgate AirID2 – the world’s first smartcard reader with Bluetooth 5 supportAirID is future proof – Bluetooth 5 will enable new possibilities. Düsseldorf, August, 10th, 2020 – certgate, one of the Read More 19 Aug 2020Cofense.News Phish Fryday – Phishing Defense ExpertiseSHARES ShareTweet Identifying a phishing email is more than a yes/no, good/bad equation. If it’s bad, you need to know how bad it is. If my user Read More 18 Aug 2020Forcepoint.News The New Normal for Cloud ArchitectureThe vast majority of customers I talk to are accelerating their digital transformation efforts. Beyond relying more on cloud applications, this Read More 18 Aug 2020BeyondTrust.News How Secure is your School for Virtual Learning this Fall? | BeyondTrustHow Secure is your School for Virtual Learning this Fall? | BeyondTrust August 17, 2020 Open You May Also Be Interested In: Our website uses Read More 18 Aug 2020News.Qualys August 2020 Patch Tuesday – 120 Vulnerabilities, 17 Critical, Media Foundation, Windows Codecs, Workstation, AdobeThis month’s Microsoft Patch Tuesday addresses 120 vulnerabilities with 17 of them labeled as Critical. The 17 Critical vulnerabilities cover Read More 18 Aug 2020News.Riverbed SteelConnect EX SD-WAN Enterprise Data Center IntegrationWe continue our learning journey on SteelConnect EX, Riverbed’s Enterprise SD-WAN offering. This time, we are going to address one of the hottest Read More 16 Aug 2020Gartner.News.Press releases.ThreatQuotient Evaluating Threat Intelligence Solutions? Download the New Gartner Market GuideEvaluating Threat Intelligence Solutions? Download the New Gartner Market Guide POSTED BY LIZ BUSH The surge in the number of remote workers, Read More 16 Aug 2020FireEye.News An Anatomy of a Public Cloud CompromiseIn many ways, the public cloud is more secure than a traditional data center. And yet, assets on the public cloud are compromised all the same. Read More 15 Aug 2020Forcepoint.News Forcepoint NGFW and Azure Virtual WAN Integration Now AvailableAzure Virtual WAN Forcepoint NGFW and Azure Virtual WAN Integration Guide Forcepoint NGFW Azure Virtual WAN is a networking service that brings Read More 15 Aug 2020News.Opentext Corporate Citizenship in 2020: Our Opportunity to Be MoreIn 2020, corporate citizenship has never been more important, or more meaningful. At OpenText, we believe that information has the power to Read More 14 Aug 2020FireEye.News Calling All Hunters: FireEye Announces Bug Bounty ProgramAs security researchers and front-line defenders, we at FireEye understand the importance of investigating and responding to security issues. We Read More 13 Aug 2020Carbon Black.News The Future of Security: Lessons from Black Hat USAFor the last 23 years, Black Hat has been the world’s leading information security event where attendees are able to experience the latest Read More 13 Aug 2020McAfee.News How We’re Using AI to Usher in the Era of the “Smarter SOC”Businesses are having to deal with two crises simultaneously—the impact of a global recession and the acceleration of malicious cyber activity. Read More 12 Aug 2020FireEye.News COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker ModuleDuring a recent investigation at a telecommunications company led by Mandiant Managed Defense, our team was tasked with rapidly identifying Read More 12 Aug 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week Ending August 2, 2020Cofense solutions enable organizations to identify, analyze, and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More 11 Aug 2020News.Titus Ep.6: Cem Uçtum – Titus Talks Cybersecurity PodcastJason Hodgert · Tuesday, August 11th, 2020 In this episode, Jason brings Sebastien Roques back to have a discussion with Cem Uçtum, from Read More 11 Aug 2020Forcepoint.News Safeguarding Your Organization Through Proactive Conduct Risk ManagementThe risk that FSI institutions and their employees will negatively harm customers or negatively impact financial market integrity The risk of Read More 11 Aug 2020BeyondTrust.News The WFH Cybersecurity & Business Continuity Lessons of Covid-19 | BeyondTrustThe WFH Cybersecurity & Business Continuity Lessons of Covid-19 | BeyondTrust August 10, 2020 Open You May Also Be Interested In: Our website Read More 11 Aug 2020Ivanti.News Workspace Control Now With Ivanti Neurons for Edge IntelligenceFollowing the formation of the Independent Business Unit earlier this year, we’ve been refocusing our attention on Ivanti Workspace Read More 11 Aug 2020News.Qualys Continuous Monitoring and BeyondAs security professionals, we struggle with the high volume of data we need to sort through while trying to parse out the critical alerts that Read More 10 Aug 2020NAKIVO.News Microsoft Office 365 Data Safety: A Full Overview of the Shared Responsibility ModelNAKIVO Blog > Office 365 Administration and Deployment > Microsoft Office 365 Data Safety: A Full Overview of the Shared Responsibility Read More 9 Aug 2020News.ThreatQuotient The contradiction of post COVID-19 risk managementSecurity vs. usability is always a constant struggle for security teams. The rapid change to remote access during the pandemic has forced Read More 9 Aug 2020FireEye.News Intelligently Test Your Security Program Against MITRE ATT&CK FrameworkFor most organizations, implementing MITRE ATT&CK™ as part of a security program is a difficult task. Many lack the necessary Read More 8 Aug 2020Forcepoint.News Believe What I Do, Not What I Say – Understanding User Security Habits with Behavioral AnalyticsWhy is this the case? While this scenario describes less than ideal training materials and processes (a topic worthy of its own blog post), it Read More 8 Aug 2020News.Opentext The customer experience is now digitalCustomer experience has increasingly been focused on digital for several years, but the events of 2020 have drastically accelerated that change. Read More 7 Aug 2020FireEye.News Bypassing MassLogger Anti-Analysis — a Man-in-the-Middle ApproachThe FireEye Front Line Applied Research & Expertise (FLARE) Team attempts to always stay on top of the most current and emerging threats. As Read More 7 Aug 2020Micro Focus.News A lesson from Wonder Woman and the Power of CollaborationWe are a quarter of the way into our INSPIRE 20 podcast journey, and I’m pleased to bring you… View Article (Feed generated with Read More 6 Aug 2020Carbon Black.News Black Hat USA 2020: VMware Carbon Black Releases Global Incident Response Threat Report Detailing Surge in Cyberattacks Amid COVID-19At Black Hat USA this week, VMware Carbon Black unveils findings from the fifth installment of the semiannual Global Incident Response Threat Read More 6 Aug 2020McAfee.News Source Code Leak – What We Learned and How You Can Protect Your IPThe latest leak appears to stem primarily from a misconfiguration of SonarQube, an open-source tool for static code analysis, which Read More 5 Aug 2020FireEye.News Announcing the Seventh Annual Flare-On ChallengeThe FireEye Labs Advanced Reverse Engineering (FLARE) team is honored to announce that the popular Flare-On challenge will return for a Read More 5 Aug 2020Checkmarx.News Privilege Escalation on Meetup.com Enabled Redirection of PaymentsAs a result of our investigations, which are further detailed in this technical report, we found several “more-common” API security issues like Read More 5 Aug 2020Cofense.News Cofense Expands SOAR Integration Partners to Accelerate Phishing Incident ResponseLEESBURG, Va., Aug. 3, 2020 – Cofense®, the global leader in intelligent phishing defense solutions, today announced enhanced phishing analysis Read More 4 Aug 2020BeyondTrust.News Reduce Service Tickets & Unburden the Help Desk by Removing Endpoint Admin Rights | BeyondTrustReduce Service Tickets & Unburden the Help Desk by Removing Endpoint Admin Rights | BeyondTrust July 31, 2020 Open You May Also Be Interested Read More 4 Aug 20204 Aug 2020McAfee.Webinars NO PAIN, NO GAIN – McAfee Q3 Technical WebinarsAre you a McAfee Partner and working with McAfee in a technical role? Then these McAfee EMEA Channel Tech Sessions are for you. Does your job Read More 4 Aug 2020News.Qualys GRUB2 Boothole Buffer Overflow Vulnerability (CVE-2020-10713) – Automatically Discover, Prioritize and Remediate Using Qualys VMDR®On July 29, 2020, Eclypsium researchers disclosed a high-risk vulnerability in GRUB2 (GRand Unified Bootloader version 2) affecting billions of Read More 3 Aug 2020NAKIVO.News A Guide to VMware vSphere 7.0 Installation and SetupNAKIVO Blog > NAKIVO Backup & Replication > A Guide to VMware vSphere 7.0 Installation and Setup August 3, 2020 by Michael Bose VMware Read More 3 Aug 2020News.Riverbed SD-WAN or WAN Optimization? | RiverbedSD-WAN or WAN Optimization? I love that question. And, in order to answer it correctly, let me first dispel a common misperception. The question Read More 2 Aug 2020News.Press releases.ThreatQuotient How Airbus CyberSecurity is Scaling and Enriching Threat Intelligence with ThreatQHow Airbus CyberSecurity is Scaling and Enriching Threat Intelligence with ThreatQ POSTED BY LIZ BUSH Mention the name “Airbus” and Read More 2 Aug 2020FireEye.News Protecting Election Integrity With the Power of Hive-IQWith local, state, and national elections fast approaching, the cyber security stakes are high. Citizens’ personal data and actual votes are Read More 2 Aug 2020News.PROFITAP Advanced Network Packet Broker Features ExplainedIn today’s modern network architecture, monitoring and security tools are required to handle traffic coming from multiple visibility Read More 1 Aug 2020Forcepoint.News Celebrating Security Leaders: 100 Global CISOs for 2020That’s why we’re excited to be part of the 2020 Global CISO100—We see it as a way to shine a light on security heroes and visionaries of today Read More 1 Aug 2020News.Opentext Partnering to deliver accessible contentReviewing a bank statement, checking an electricity bill, or even reading a restaurant menu — simple, everyday actions that most people Read More 1 Aug 2020Centrify.News Securing DevOps with Centrify Delegated Machine CredentialsAt its core, DevOps focuses on delivering faster time to market with more reliability and efficiency through a cycle of rapid, continuous Read More 31 Jul 2020FireEye.News Obscured by Clouds: Insights into Office 365 Attacks and How Mandiant Managed Defense InvestigatesWith Business Email Compromises (BECs) showing no signs of slowing down, it is becoming increasingly important for security analysts to Read More 31 Jul 2020Indeed Identity.News Indeed Identity and vMind join forces to provide best solutions for Turkish marketWe are happy to announce our first exclusive distribution agreement in the EMEA region signed with vMind, the leading IT distribution company in Read More 31 Jul 2020Micro Focus.News The Net Promoter® Education DifferenceThe Education Difference Education. This is not normally a touchpoint along the customer journey that most people think of… View Read More 30 Jul 2020Carbon Black.Gartner.News Carbon Black EDR’s All-New Live Query Capability and Enhanced Fileless VisibilityVMware Carbon Black is excited to announce that VMware Carbon Black EDR (formerly CB Response), recently named by Gartner as a 2020 Read More 30 Jul 2020McAfee.News Introducing MITRE ATT&CK in MVISION Cloud: Defend with PrecisionMost enterprises use over 1,500 cloud services, generating millions of events, from login, to file share, to download and an infinite number of Read More 29 Jul 2020FireEye.News ‘Ghostwriter’ Influence Campaign: Unknown Actors Leverage Website Compromises and Fabricated Content to Push Narratives Aligned With Russian Security InterestsMandiant Threat Intelligence has tied together several information operations that we assess with moderate confidence comprise part of a broader Read More 29 Jul 2020Checkmarx.News On the Road to DevSecOps: Securing the Software Driving MobilityHowever, the increasing number of applications and software-driven components are also associated with an increase in software-related risks. Read More 29 Jul 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week Ending July 19, 2020Cofense solutions enable organizations to identify, analyze, and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More 28 Jul 2020News.Titus Ep. 5: Paul Starrett – Titus Talks Cybersecurity PodcastPrivacy: What does it mean and how do we achieve it? Jason Hodgert · Monday, July 27th, 2020 This is just part of the fast-paced Read More 28 Jul 2020Forcepoint.News More Is Not Merrier: Point Products Are DeadOrganizations using more than 50 tools to manage their security environment and respond to incidents ranked 8% lower in their ability to detect Read More 28 Jul 2020BeyondTrust.News Remote Access, Cloud Adoption, & Digital Transformation are Accelerating: PAM Secures & Enables It | BeyondTrustRemote Access, Cloud Adoption, & Digital Transformation are Accelerating: PAM Secures & Enables It | BeyondTrust July 23, 2020 Open You Read More 27 Jul 2020NAKIVO.News NAKIVO Backup & Replication v10 Now Supports VMware vSphere 7NAKIVO Blog > NAKIVO Backup & Replication > NAKIVO Backup & Replication v10 Now Supports VMware vSphere 7 July 23, 2020 by Grace Read More 27 Jul 2020McAfee.News The Schrems II Decision: The Day AfterThe European Court of Justice (“CJEU”) yesterday invalidated the Privacy Shield, an agreement between the European data regulators and the U.S. Read More 26 Jul 2020News.Niagara Networks L7 Defense and Niagara Networks Close the API Security GapWritten by Zeev Draer VP of Marketing Niagara Networks and Ilan Paretsky CMO L7 Defence If there’s one need more critical than others Read More 26 Jul 2020News.ThreatQuotient Emerging Threats During Times of Crisis: Insights from Airbus Cybersecurity’s Phil JonesThe global pandemic has highlighted the importance of being prepared for the unexpected. Opportunistic attackers are taking advantage of rapidly Read More 25 Jul 2020Forcepoint.News Shining the Light on Forcepoint Advanced Classification Engine (ACE)The creation and evolution of ACE by the Forcepoint X-Labs team started more than a decade ago. This tried and trusted technology protects you, Read More 25 Jul 2020News.Opentext Resilience and innovation in the face of insecuritySwitch knows data. As a world leader in data center ecosystems with 100% uptime, the Las Vegas company powers connection and safeguards data for Read More 25 Jul 2020Centrify.News Centrify Extends Industry-Leading PAM Deployment Options with Hyper-Scalable Privileged Access ServiceIn the 20.3 product release for Centrify Privileged Access Service (PAS), we unveiled a new architecture offering that allows hyper-scalable Read More 24 Jul 2020FireEye.News FireEye – A Partner to the State, Local Government and Education SectorsIn previous blog posts, I spent a good deal of time focusing on the threat landscape facing State, Local Government and Education systems. Read More 24 Jul 2020Micro Focus.News Lending Privilege – how can we do more to lift one another up and create a more inclusive workplace?The story continues Our INSPIRE podcast journey just keeps on getting better. Hot on the heels of our podcast with June Manley, founder of F4, I Read More 23 Jul 2020Allied Telesis.News A Quick Guide to Industrial EthernetWhat is Industrial Ethernet? Industrial Ethernet refers to the use of networking devices, usually switches, in harsh environments. Ethernet is Read More 22 Jul 2020FireEye.News Unique Threats to Operational Technology and Cyber Physical SystemsIn this latest episode of our Eye on Security podcast, I talk all about the world of operational technology (OT) and cyber physical systems with Read More 22 Jul 2020Checkmarx.News On the Road to DevSecOps: Top Three Benefits of CxFlowPertaining to development tools, DevOps is also about automation of the different tooling in use that improves the speed of software delivery. Read More 22 Jul 2020Cofense.News Phish Fryday – Q2 2020 Phishing ReviewLearn more: Share: As phishing attacks remain a top threat to organizations across the globe, it’s critical to understand just what tactics and Read More 21 Jul 2020News.Titus Updated Titus Methodology in three phasesScott Hubert · Thursday, July 16th, 2020 It was around 2013 when we began to realize that while data classification is a technology Read More 21 Jul 2020Forcepoint.News.Webinars Top 10 Cybersecurity Trends Due to COVID-19Here’s a taste of my Top 10 Cybersecurity Trends list (for the full experience, click the Watch the Webcast button on the right). Overall, the Read More 21 Jul 2020News.Qualys Automatically Discover, Prioritize and Remediate Windows DNS Vulnerability (CVE-2020-1350) Using Qualys VMDR®On July 14, 2020, Microsoft issued a new security advisory on Microsoft Windows Patch Day – addressing CVE-2020-1350, also known as SigRed – a Read More 20 Jul 2020NAKIVO.News VMware vSphere 7 Released: What’s New?NAKIVO Blog > Data Protection > Backup Technologies > VMware vSphere 7 Released: What’s New? July 16, 2020 by Michael Bose VMware Read More 20 Jul 2020McAfee.News Create Strong Passwords with a Password GeneratorTo effectively protect your accounts from being hacked, it’s important that you have a strong password with each account that you create. Read More 19 Jul 2020FireEye.News 9.0 Release for the Network Security Product PortfolioFireEye is excited to announce the release of version 9.0 for our Network Security product portfolio that includes Network Security (NX), Central Read More 18 Jul 2020News.Opentext How information governance helps reduce IT budgetsA volatile economy and massive disruptions to business models have many IT planners scrambling to allocate budget and keep up with the changes. Read More 18 Jul 2020News.Riverbed Future of Work Survey 2020 | How Companies are Planning for ‘Work from Anywhere’ | RiverbedAs the “new normal” becomes just normal, companies are preparing for a large-scale, long-term shift to remote work, where increasingly employees Read More 17 Jul 2020FireEye.News capa: Automatically Identify Malware Capabilitiescapa is the FLARE team’s newest open-source tool for analyzing malicious programs. Our tool provides a framework for the community to encode, Read More 17 Jul 2020Indeed Identity.News New Indeed CM 6.2 release shapes the future of PKIWe have added a number of new functionalities to the Indeed CM software since the last release. The brand new features include the introduction Read More 16 Jul 2020Carbon Black.News Tax Day Fraud: “Identity Theft Subscriptions” in High Demand on the Dark WebWith billions of stolen usernames, passwords, banking information and more circulating on the dark web, identity theft is an evolving and Read More 15 Jul 2020FireEye.News SCANdalous! (External Detection Using Network Scan Data and Automation)Real Quick In case you’re thrown by that fantastic title, our lawyers made us change the name of this project so we wouldn’t get sued. Read More 15 Jul 2020Checkmarx.News Mutation Cross-Site Scripting (mXSS) Vulnerabilities Discovered in Mozilla-BleachAccording to documentation, “Bleach is an allowed-list-based HTML sanitizing library that escapes or strips markup and attributes and is intended Read More 15 Jul 2020Cofense.News Practitioners Report the Need for Layered Email SecurityIn a recent survey, a majority of practitioners agreed on the need for protection that augments email gateways to deal with phishing attacks. By: Read More 15 Jul 2020Cofense.News HMRC latest target in global COVID relief phishing campaignsTaxes and rebates have long been some of a phisher’s favorite targets. Now the coronavirus has provided a fresh new way to exploit this topic: Read More 14 Jul 2020News.Titus Ep.4: Neil Thacker – Titus Talks Cybersecurity PodcastJason Hodgert · Thursday, July 9th, 2020 In this episode, the podcast goes overseas to get a global perspective on data security from Read More 14 Jul 202014 Jul 2020McAfee.News.ThreatQuotient Join us at “The Evolution of Threat Intelligence” RoundtableWednesday, July 22nd at 4:00 PM CEST / 10:00 AM EST. Signup and registration Is threat intelligence the apéritif to successful security Read More 12 Jul 2020News.ThreatQuotient Profile of a FounderAn exclusive Tech Tribune Q&A with Ryan Trost (co-founder and CTO) and Wayne Chiang (co-founder and Chief Architect) of Read More 12 Jul 2020FireEye.News The New Remote Workforce: Why Organizations Need Security Validation Now More Than EverThe way we collectively live, work and play has drastically changed. As social distancing measures continue, the human and economic costs are Read More 11 Jul 2020Forcepoint.Gartner.News Forcepoint Named a 2020 Gartner Peer Insights Customers’ Choice for Enterprise DLPThe Gartner Peer Insights Customers’ Choice is a recognition of vendors in this market by verified end-user professionals, taking into account Read More 11 Jul 2020Ivanti.News Ivanti to Announce Big Changes This MonthIt’s been a rough year in terms of… well, everything. But here at Ivanti, we’re delivering only good news this month. We Read More 11 Jul 2020News.Opentext Meeting your customers where they areIn a 2017 State of Global Customer Service Report by Microsoft, 98% of respondents said customer service was important in their brand choices and Read More 10 Jul 2020FireEye.News Opening Doors: Supporting Women Leaders Through Our Partnership With Athena AllianceThroughout my career, I was regularly the first and only woman in the room. As a junior law firm associate, I was often mistaken for an assistant Read More 10 Jul 2020Micro Focus.News #DevDay 2020 from the comfort of homeRecent world events regarding the pandemic of 2020 have emphasized the importance of digital readiness and modernizing core business… View Read More 9 Jul 2020Carbon Black.News TAU Threat Discovery: Conti RansomwareConti is a new family of ransomware observed in the wild by the Carbon Black Threat Analysis Unit (TAU). Unlike most ransomware, Conti Read More 8 Jul 2020FireEye.News Configuring a Windows Domain to Dynamically Analyze an Obfuscated Lateral Movement ToolWe recently encountered a large obfuscated malware sample that offered several interesting analysis challenges. It used virtualization that Read More 8 Jul 2020Cofense.News Phish Fryday – Cutting Through the Noise at IMAXLearn more: Security analysts need data – lots of data – to do their jobs defending organizations. It’s easy to drown in all the noise, though, Read More 7 Jul 2020News.Titus Orchestrating data security through effective data identificationHome » Blog » Orchestrating data security through effective data identification Maheswaran Shanmugasundaram · Tuesday, June 30th, 2020 As Read More 7 Jul 2020BeyondTrust.News Passwordless Administration Explained | BeyondTrustPasswordless Administration Explained | BeyondTrust July 6, 2020 Open You May Also Be Interested In: Our website uses cookies to provide a better Read More 7 Jul 2020News.Qualys F5 BIG-IP Remote Code Execution Vulnerability (CVE-2020-5902)F5 Networks recently released updates for the critical RCE vulnerability (CVE-2020-5902) that affects its BIG-IP products. The vulnerability that Read More 6 Jul 2020McAfee.News.Webinars Multi-Cloud Environment Challenges for Government AgenciesHybrid and multi-cloud architectures can offer government agencies the flexibility, enhanced security and capacity needed to achieve what they Read More 6 Jul 2020Micro Focus.News Refreshing Insights for Modern COBOLIntroduction In its seventh decade, COBOL’s heritage is legendary. This month sees yet another stride forward in COBOL innovation,… Read More 5 Jul 2020News.ThreatQuotient The hot technology talking point for the second half of 2020Ryan Trost, Co-Founder and CTO, ThreatQuotient, explains what he thinks will be the hot technology talking point for the second half of 2020. Read More 4 Jul 2020Forcepoint.News Forcepoint Minute Videos Now Available on Forcepoint.comIf your organization is currently looking to revamp its cloud security or data protection solutions, it will be worth a few minutes of your time Read More 4 Jul 2020News.Opentext Building secure communication resiliency at the desktopThe unprecedented events of 2020 have shown many organizations the cracks in their infrastructure. Faced with the sudden reality of remote work Read More 3 Jul 2020FireEye.News Cloud Security: Separating Fact From FictionCloud technologies offer cost and efficiency benefits to organizations in every industry worldwide; however, inexperience in working with cloud Read More 3 Jul 2020News.Riverbed Adaptive Thresholds | New AppResponse Adaptive Thresholds Reduces False Positives | RiverbedPerformance monitoring is typically based on comparing measurable values against a set of threshold values. In theory, the IT operations team Read More 2 Jul 2020Carbon Black.News 6 Best Practices to Fight a New Breed of Insider ThreatsThe current global pandemic has disrupted how organizations work. Some businesses quickly adapt while other organizations are still Read More 2 Jul 2020News.PROFITAP What is a Network Packet Broker?Network visibility is a necessity in today’s digital era. More enterprises are integrating network monitoring solution in their IT Read More 1 Jul 2020Checkmarx.News The Road to DevSecOps: Addressing the Challenges of AppSec AwarenessStephen: Since our world relies heavily on software, today more than ever before, software must equal security. In this context, what are your Read More 1 Jul 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week Ending June 28, 2020Cofense solutions enable organizations to identify, analyze, and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More 30 Jun 2020News.Titus Ep.3: Wally Bitaut – Titus Talks Cybersecurity PodcastLearn how Seclore and Titus works together in delivering a powerful, scalable data protection solution. Jason Hodgert · Tuesday, June Read More 30 Jun 2020Forcepoint.News Top 3 C-Level Risk Points: People, Places and ThingsPeople Especially with the plight we are currently facing, Dave characterizes his position as that of chief resilience officer. He makes the Read More 30 Jun 2020BeyondTrust.News Picking up Where Microsoft Leaves off with Modern Management, Endpoint & Application Security | BeyondTrustPicking up Where Microsoft Leaves off with Modern Management, Endpoint & Application Security | BeyondTrust June 26, 2020 Open You May Also Read More 30 Jun 2020News.Qualys Ripple20: Multiple Vulnerabilities Identified in Treck TCP/IP StackMultiple vulnerabilities that use a low-level TCP/IP software library developed by Treck, Inc. were identified recently in implementations of the Read More 29 Jun 2020NAKIVO.News Microsoft Office 365 and Data Protection: Risks in Shared Responsibility—New White PaperNAKIVO Blog > NAKIVO News > Microsoft Office 365 and Data Protection: Risks in Shared Responsibility—New White Paper June 26, 2020 by Grace Read More 29 Jun 2020Micro Focus.News How companies can lessen financial impacts through DX and technologyThe ‘new normal’ I’ve been chatting with many colleagues over the last few months as I learn more about digital transformation (DX) and work on Read More 28 Jun 2020News.Press releases.ThreatQuotient Combating the Threat Landscape in the Public SectorCombating the Threat Landscape in the Public Sector POSTED BY ANTHONY PERRIDGE 2019 saw a significant rise in ransomware attacks on public sector Read More 28 Jun 2020Allied Telesis.News Top 5 Reasons Why Your Healthcare Organization Should Use Wireless TechnologyTechnology has transformed the way healthcare providers practice and care for patients. For instance, electronic medical record-keeping no longer Read More 27 Jun 2020Forcepoint.News Secure Hybrid Access to Forcepoint Products with Azure Active DirectorySecurity products then started adopting standard identity protocols (e.g. RADIUS, LDAP) to enable central access and role management within their Read More 27 Jun 2020News.Opentext A new way of working reduces delays and eases sufferingWith a commitment to social transformation, the South African Department of Social Development (DSD) endeavors to provide a better life for the Read More 26 Jun 2020FireEye.News Sizing Up: How Mandiant Evaluates Ransomware DefenseOrganizations across various regions, industries, and sectors have identified ransomware as a significant risk and wonder if they are positioned Read More 26 Jun 2020Micro Focus.News I think, therefore I modernize: introducing Enterprise Suite 6.0I need to change – IT needs to change Rapid and large-scale IT change is a very costly exercise…. View Article (Feed generated with Read More 25 Jun 2020Carbon Black.News Popular Techniques Used by Cybercriminals Amid COVID-19(Editor’s Note: Gary Stevens, a technology writer, is posting as a guest author to carbonblack.com). Cybercriminals constantly Read More 25 Jun 2020Gartner.McAfee.News.Webinars What to Expect from the Next Generation of Secure Web GatewaysWhile secure web gateways (SWGs) have operated on a far more compressed timetable, a similarly drastic evolution has taken place. SWGs are still Read More 24 Jun 2020FireEye.News Clouds Are Secure, Are You Using Them Securely?Cloud technology isn’t new, but it’s still unfamiliar ground for many organizations. As if migrating to the cloud wasn’t already a massive Read More 24 Jun 2020Checkmarx.News It’s Time to Update Your Drupal Now!Drupal just recently released two major versions, which piqued our researchers’ interest. Once the team got to work on the two latest versions of Read More 24 Jun 202029 Jun 2020Group-IB.News.Press releases Group-IB enters the Adriatic region joining forces with Slovenia’s REAL securityMaribor, 24/06/20 – Group-IB, a Singapore-based cybersecurity company Group-IB, has signed a partnership agreement with REAL security. REAL Read More 24 Jun 202024 Jun 2020Group-IB.Press releases.Serbo-Croatian Group-IB vstopa v Adriatik regijo v sodelovanju s slovenskim REAL securityMaribor, 24/06/20 – Singapurska družba za kibernetsko varnost, Group-IB, je podpisala partnersko pogodbo z distributerjem dodane vrednosti REAL Read More 24 Jun 2020Backbox.News How Can Organizations Best Go About With Disaster Recovery Planning In 2020?How Can Organizations Best Go About With Disaster Recovery Planning In 2020? A disaster recovery plan is a document that protects an organization Read More 24 Jun 2020Cofense.News Practice Makes PerfectThe Phishing Defense Center (PDC) has discovered two distinct phishing campaigns found in environments protected by Proofpoint that spoof Twitter Read More 23 Jun 2020News.Titus Together we are stronger – Partnerships that workJames Phillips · Wednesday, June 17th, 2020 Over the last 12 months, I have been part of the Titus team that has pivoted the organization Read More 23 Jun 2020Forcepoint.News.Webinars Takeaways from New Federal IT Leadership ReportThe new report, Federal Cybersecurity in a Changing World, garnered feedback from federal IT practitioners on the state of cybersecurity today, Read More 23 Jun 2020BeyondTrust.News How Trusted Application Protection Builds on Application Control & Endpoint Privilege Management | BeyondTrustHow Trusted Application Protection Builds on Application Control & Endpoint Privilege Management | BeyondTrust June 18, 2020 Open You May Read More 23 Jun 2020Centrify.News Centrify’s Channel Leaps Forward with Reliance Program, New DistributorsSo far, the first half of 2020 has been busy at Centrify. We have focused on talking with our partners and customers to build a world-class Read More 22 Jun 2020NAKIVO.News NAKIVO Backup & Replication v10 Beta: What’s New?NAKIVO Blog > NAKIVO Backup & Replication > NAKIVO Backup & Replication v10 Beta: What’s New? June 18, 2020 by Grace Norman At Read More 21 Jun 2020News.Niagara Networks Niagara Networks Majestics Partner ProgramRecently, Niagara Networks formally announced its Majestics Partner Program in North America targeting the regional VAR, system integrator, Read More 21 Jun 2020News.Press releases.ThreatQuotient Maturing Approach as Cyber Threat Intelligence Pays DividendsMaturing Approach as Cyber Threat Intelligence Pays Dividends POSTED BY ANTHONY PERRIDGE In the battle to protect businesses from relentless Read More 21 Jun 2020FireEye.News Improve Security Effectiveness and Efficiency by Validating ToolsPublic-sector institutions are at high risk from a variety of threats, everything from nation state reconnaissance to data theft and ransomware. Read More 20 Jun 2020Forcepoint.News The SASE CyberSummit: What You Need to KnowBeyond the keynotes, our virtual summit will feature five practical 30-minute sessions designed to provide your organization with the building Read More 20 Jun 2020News.Opentext Empower your remote workforce with OpenText Anywhere on Microsoft AzureWith the recent increase in remote and home-based workers, organizations must now manage key applications and secure their remote workforce in a Read More 20 Jun 2020Centrify.News Keep Laser-Focused on Securing Access to Your Datacenter Servers and AppsDon’t Ignore Major Attack Surfaces Like Tenable and ServiceNow. A scary stat we’ve heard for a few years now is that around 80% of data breaches Read More 19 Jun 2020News.ThreatMark ThreatMark Listed as a Representative Vendor in Gartner’s Market Guide for Online Fraud DetectionWe are thrilled to announce that ThreatMark, a leading provider of a full-fledged banking fraud prevention solution, was selected by Gartner and Read More 19 Jun 2020FireEye.News Gaining Visibility and Threat Detection in Cloud Content With Box and FireEyeBusinesses share content internally and externally with suppliers, customers and others in a variety of ways. Technologies make it faster for Read More 19 Jun 2020Certgate Bluetooth BIAS Attacks? AirID is safe!BIAS Attack? AirID is not affected and especially safe – BIAS Attack has no chance on AirID. Düsseldorf, 29.05.2020, certgate, Read More 19 Jun 2020Micro Focus.News IDC Issues Commentary on Micro Focus and Smart Digital TransformationAnalysts from tier-one industry analyst firm, IDC, were invited to Micro Focus Universe last month to learn more about the company and our Read More 18 Jun 2020Carbon Black.News Court Ruling on Forensic Data Breach Reporting Flying Under the RadarOne thing that may have flown under the radar in recent weeks is that a court has ruled that Capital One must allow plaintiffs to review a Read More 18 Jun 2020News.Riverbed How to Solve Performance Issues When Your Traffic Is Encrypted With SSL | RiverbedWith the security concerns we face these days it’s ever so important for organizations to use encryption to secure their data in transit. And Read More 17 Jun 2020FireEye.News FLARE IDA Pro Script Series: MSDN Annotations Plugin for Malware AnalysisThe FireEye Labs Advanced Reverse Engineering (FLARE) Team continues to share knowledge and tools with the community. We started this blog series Read More 17 Jun 2020Checkmarx.News Bringing Your Retail Application Security Strategy Up to ParThis overnight shift to e-commerce dependence impacts all departments within retail organizations, especially IT and security. As marketing and Read More 17 Jun 2020Indeed Identity.News Webinar: Digital certificate management that is in tune with the timesWe are pleased to invite you to the online webinar “Digital certificate management that is in tune with the times.” prepared by Read More 17 Jun 2020Cofense.News New Mass Logger Malware Could Be MassiveCofense Intelligence is tracking a recently released keylogger named “Mass Logger” which could significantly impact the keylogger market and the Read More 16 Jun 2020News.Titus What do companies really do with your data?So you’ve just clicked ‘accept’ on a website’s cookie consent warning. Great! Now what? Jamie Manuel · Tuesday, June 9th, 2020 Serious Read More 16 Jun 2020Forcepoint.News Cloud Adoption: Is It Moving Faster Than Your Data Protection Strategy? (Part 2)Increasing visibility (covered in Part 1) Remaining flexible and agile Integrating on-premises and cloud security solutions In this post, I’ll Read More 16 Jun 2020BeyondTrust.News Raising the Bar on Government Endpoint Security | BeyondTrustRaising the Bar on Government Endpoint Security | BeyondTrust June 11, 2020 Open You May Also Be Interested In: Our website uses cookies to Read More 16 Jun 202016 Jun 2020Netwrix.News A Perfect Prebuilt Package for Auditing and ComplianceTo solve your most pressing audit and compliance needs, we offer a fixed-price bundle that includes Netwrix Auditor applications for three core Read More 16 Jun 2020News.Qualys Secure Your Global Remote WorkforceUpdate June 9, 2020: Qualys adds Malware Detection to Free 60 days Remote Endpoint Protection offering. This post has been updated to reflect Read More 16 Jun 2020Centrify.News Cloud Changes Everything When it Comes to PAMMy role as Director of Corporate Communications at Centrify requires me to wear many hats. One of them is heading up our public relations program Read More 15 Jun 2020News.Utimaco 7 Steps to Reduce Total Cost of Ownership Around HSMs to Gain Force in a Disrupting Finance MarketFor more information from Utimaco Blog, visit https://www.utimaco.com/Read More 14 Jun 2020News.Press releases.ThreatQuotient ThreatQuotient Granted DoDIN-Level Authority to OperateThreatQ is the first threat-centric security operations platform to be approved for a DoD-wide ATO Reston, Va. – June 10, 2020 – Read More 14 Jun 2020News.Versasec Releasing vSEC:CMS Version 5.8Date: 2020-06-08Author: Joakim Thorén, CEO Previous << Corona USS Rollout Version 5.8 is the fastest version of vSEC:CMS that we have ever Read More 13 Jun 2020Forcepoint.News Hackers Perspective on AI – Panel at Ai4CybersecurityAs is the case in recent months I find myself participating in virtual events. On May 14, I had the privilege of moderating a panel on the topic Read More 13 Jun 2020News.Opentext Cloud: The operating engine for information-fueled business transformationGuest blog by Melanie Posey, Research Vice President and General Manager, Voice of the Enterprise, 451 Research. In times of crisis, resiliency Read More 13 Jun 2020Centrify.News IDSA Report Reveals Continued Over-Confidence in Securing Privileged IdentitiesThe Identity Defined Security Alliance (IDSA) recently published a new report titled, “Identity Security: A Work in Progress,” about Read More 12 Jun 2020FireEye.News Intelligence-Led Threat Protection for SaaS-Mobile Workforce — FireEye Detection With CipherCloudWhen organizations turn to cloud apps to support the remote workforce and maintain business continuity, bad actors will follow. Employees working Read More 12 Jun 2020Micro Focus.News Sharpen your competitive edge using COBOL and mainframe systemsBrian Crane, Solution Director at Micro Focus, looks at the issues affecting IT leaders today and offers some rare insights into smart ways to Read More 11 Jun 2020Carbon Black.News TAU Threat Analysis: Hakbit RansomwareThe bad actor(s) behind Hakbit ransomware recently released an updated variant of their ransomware, which encrypts the victim’s Read More 11 Jun 2020Ivanti.News June Patch Tuesday 2020Microsoft resolves 129 unique common vulnerabilities and exposures (CVEs) this June, but there are no Publicly Disclosed or Exploited CVEs to be Read More 11 Jun 2020McAfee.News Quantifying Cloud Security EffectivenessSo now we have security tools in place to secure our cloud assets in SaaS, PaaS and IaaS. The next step is to determine what security controls Read More 10 Jun 2020FireEye.News FireEye Virtual Summit: Empower, Evolve and DefendIn today’s rapidly changing environment as digital attack surfaces are increasing, FireEye is proud to serve its mission to relentlessly protect Read More 10 Jun 2020Cofense.News Cofense Launches Free Resource Center and Searchable Database Highlighting the Latest Phishing Attacks that Bypass Email Security TechnologiesBuilt on the world’s largest data lake of phishing threats found by real people, Cofense combines the power of collective human detection and Read More 9 Jun 2020News.Titus Ep.2: Matt Henson – Titus Talks Cybersecurity PodcastHow to better understand trade compliance and how technology can help organizations streamline international trade Jason Hodgert · Read More 9 Jun 2020Forcepoint.News Forcepoint NGFW + Amazon GuardDuty = Increased Threat Detection and MonitoringIn this scenario, any security strategy needs an extended threat detection capability to identify attacks targeting both technology stacks Read More 9 Jun 2020BeyondTrust.News Security Questions Pose a High Risk: Learn Tips & Tricks to Mitigate the Threat | BeyondTrustSecurity Questions Pose a High Risk: Learn Tips & Tricks to Mitigate the Threat | BeyondTrust June 5, 2020 Open You May Also Be Interested Read More 9 Jun 2020News.Qualys Product, API & Library Notifications Move to Notifications.qualys.comQualys has consolidated notifications of new product features, API changes, and policy library updates at Qualys Notifications to make it easier Read More 8 Jun 2020NAKIVO.News NAKIVO Backup & Replication v9.4 Introduces Backup to Amazon S3, P2V Recovery and MoreNAKIVO Blog > NAKIVO Backup & Replication > NAKIVO Backup & Replication v9.4 Introduces Backup to Amazon S3, P2V Recovery and More Read More 7 Jun 2020News.Niagara Networks Network Flexibility and AgilityCaltech has an amazing history of scientific discoveries and breakthroughs. For many people Caltech is synonymous with “rocket Read More 7 Jun 2020News.ThreatQuotient Strengthen Cybersecurity With These 3 Steps to Rapid ResponsePlanning for Rapid Response Will Help Ensure You Have a Foundation in Place During Times of Crisis Crises and outbreaks change us and society, Read More 7 Jun 2020FireEye.News Security Without Barriers, Part Two: Planning for Cyber ResilienceThe network perimeter was a key component for defense-in-depth cyber security strategies, separating the internal “trusted” environment from the Read More 6 Jun 2020Forcepoint.News.Webinars 3 Tips to Protect Essential Data in a Multi-cloud EnvironmentAs more data moves to the cloud—and employees are expected to work from anywhere, at any time, on any device—security teams are challenged to Read More 6 Jun 2020News.Opentext Rapid Radiology puts the focus on senior careAs one of the largest teleradiology providers in the U.S., Rapid Radiology was established to expedite and enhance patient diagnosis and Read More 6 Jun 2020Centrify.News Secure Remote Access Blog Part 2: The Best ApproachWelcome back! This is the second part of a blog about Secure Remote Access for IT Administrators, which highlights Good/Better
27 Feb 2021Forcepoint.News EMEA Perspective – Building Resilient CybersecurityIt’s no secret that hackers outnumber the cybersecurity professionals trying to stop them. And that gap will likely continue to widen. But Read More
27 Feb 2021News.Opentext Tackling the challenges of remote working during a pandemicPlanning flight operations is a complex and time-critical task, made even more challenging during the coronavirus pandemic. Eurowings, a Read More
27 Feb 2021Array Networks.News 6 Networking Trends in 2021: Let’s Get Braced for the “Next Normal”Over the last decade, we’ve seen some of the most significant disruptions in networking technology. However, nothing beats the speed at Read More
26 Feb 2021Micro Focus.News INSPIRE 20 Podcast: Meet Rod Flavell, CEO, FDM GroupINSPIRE 20 Podcast: Meet Rod Flavell, CEO, FDM Group Rod Flavell, founder and chief executive officer of the FDM Group, ensures that inclusivity Read More
25 Feb 2021Carbon Black.News VMware Carbon Black Named to the 2021 CRN Security 100 ListWe are proud to announce that CRN®, a brand of The Channel Company, has named VMware Carbon Black to its annual Security 100 list. The Read More
24 Feb 202124 Feb 2021News UTIMACO WEBINAR: Securing your IT INFRASTRUCTUREJOIN US on March 11th where we will be presenting you how to ensure your IT infrastructure from attacks. In this webinar we discuss the Read More
24 Feb 2021Cofense.News Telegram Utilized for Harvesting CredentialsTelegram is a popular messaging app. Its encrypted messages, and potential message self-destruct options, can be attractive to legitimate users Read More
23 Feb 2021BeyondTrust.News 3 Powerful Tools for CISOs to Boost their Organizational Influence | BeyondTrust3 Powerful Tools for CISOs to Boost their Organizational Influence | BeyondTrust Free Privileged Account Discovery Tool: Identify & secure Read More
22 Feb 2021NAKIVO.News SharePoint Online Central Administration: A Detailed GuideNAKIVO Blog > Office 365 Administration and Deployment > SharePoint Online Central Administration: A Detailed Guide February 22, 2021 by Read More
21 Feb 2021News.Press releases.ThreatQuotient Reducing Enterprise Cyber Risk During COVID-19Reducing Enterprise Cyber Risk During COVID-19 ED AMOROSO This article was shared with the TAG Cyber community during the earliest days of the Read More
21 Feb 2021News.Versasec A shifting data access and storage dynamic has given rise to a new security category: Secure access service edgeDate: 2021-02-18Author: Ellen Thorén Previous << Sandia National Laboratories Casestudy The growth of mobile, edge and cloud data are Read More
20 Feb 2021Forcepoint.News Help me trojanize you – Microsoft Compiled HTML Help is back for another roundIn the past few weeks, malicious spam campaigns have surfaced that include attachments of varying archive types. Whilst the archives were mostly Read More
20 Feb 2021News.Opentext Modernize your legacy applicationsMany organizations continue to hold onto legacy applications and systems for compliance and regulatory reasons. But they find it expensive and Read More
18 Feb 2021McAfee.News Domain Age as an Internet Filter CriteriaDomain Age Feature Definition The sites and domains of the internet are constantly changing and evolving. In the first quarter of 2020 an average Read More
18 Feb 2021News.Riverbed Pinpointing Application Performance Issues with Unified NPM | RiverbedWith employees and business partners working from home due to the pandemic, non-enterprise internet connections have exacerbated the issue of Read More
18 Feb 2021Allied Telesis.News How Networking Supports Zero Defects ManufacturingIn recent years, manufacturing enterprises are accelerating their digital transformation as part of the fourth industrial revolution (Industry Read More
17 Feb 2021Indeed Identity.News The New Normal of European PKI – An Interview With CA Expert Adam RossThe roundtable «Evolution of Trust: Get ready for PKI 2.0» was about the most confusing, yet vital topics that remain puzzles to many Read More
17 Feb 202117 Feb 2021News Real security is extending their presence with a NDR market leader ExtraHop across the Central Eastern EuropeReal security, a Slovenian based Value Added distributor enters Poland, Czech Republic and Bulgaria by joining forces with ExtraHop, a market Read More
17 Feb 2021Cofense.News Phish Found in SEG-Protected Environments Week ending February 12, 2021100% of the phish seen by the Cofense Phishing Defense Center (PDC) have been found in environments protected by Secure Email Gateways (SEGs), Read More
16 Feb 2021BeyondTrust.News Aligning Credential & Identity-Based Risk Management with Government Mandates | BeyondTrustAligning Credential & Identity-Based Risk Management with Government Mandates | BeyondTrust Free Privileged Account Discovery Tool: Identify Read More
16 Feb 202116 Feb 2021News JOIN THE EKRAN SYSTEM PARTNER PROGRAMEkran System® is a full cycle insider threat management platform that focuses on three core goals: deter, detect, and disrupt Date: Friday, 19th Read More
16 Feb 2021News.Qualys Expand Your Vulnerability & Patch Management Program to Mobile Devices with Qualys VMDRAs mobile devices have become ubiquitous in almost every business process, whether in bank branches, manufacturing sites or retail stores, they Read More
14 Feb 2021News.Niagara Networks A brand-new year and cybersecurity defense thoughtsIt is a brand-new year, and by now you would probably hear from someone that they were busy or sharing about their unique virtual SKO experience.Read More
14 Feb 2021News.Press releases.ThreatQuotient Automate, Adopt, Adapt: How Cyber Threat Intelligence Evolved over the last 12 monthsAutomate, Adopt, Adapt: How Cyber Threat Intelligence Evolved over the last 12 months LIZ BUSH The SANS 2021 Cyber Threat Intelligence (CTI) Read More
13 Feb 2021Forcepoint.News Why Zero Trust is Needed in the Real World TooA real-word example of why Zero Trust matters But the need for Zero Trust doesn’t stop at the cyber edge. With so many processes in our daily Read More
13 Feb 2021News.Opentext What is digital experience?Digital experience inhabits a realm packed with similar terms. You have digital experience management (DXM), customer experience (CX), customer Read More
12 Feb 2021Micro Focus.News Spotlight on Black History MonthAt Micro Focus, our theme for Black History Month in 2021 is “Embracing the Past While Building for the Future”. We caught up with Eric Beulah, Read More
11 Feb 2021Ivanti.News February Patch Tuesday 2021Second Patch Tuesday of 2021 is here and while the CVE counts are low there are a number of publicly disclosed and zero day vulnerabilities to be Read More
11 Feb 2021Gartner.McAfee.News XDR – Please Explain?Security vendors have spent the last two decades providing more of the same orchestration, detection, and Read More
10 Feb 2021Cofense.News Phish Found in Proofpoint-Protected Environments Week ending February 5, 2021Cofense solutions enable organizations to identify, analyze, and quarantine email threats in minutes. 100% of the phish seen by Read More
9 Feb 2021BeyondTrust.News A Cybersecurity Wellness Check for the Healthcare Industry | BeyondTrustA Cybersecurity Wellness Check for the Healthcare Industry | BeyondTrust Free Privileged Account Discovery Tool: Identify & secure Read More
9 Feb 2021News.Qualys Unified SaaS Application Security, Detection, and ResponseOrganizations are rapidly embracing Software as a Service (SaaS) applications for scalability, ease & flexibility of use, and the benefits of Read More
8 Feb 2021NAKIVO.News How to Use SharePoint Online for Data Management: A Complete GuideNAKIVO Blog > Office 365 Administration and Deployment > How to Use SharePoint Online for Data Management: A Complete Guide February 8, Read More
8 Feb 2021McAfee.News 6 Best Practices for SecOps in the Wake of the Sunburst Threat CampaignPlan, test and continuously improve your SecOps processes with effective purple-teaming exercises. Try to think like a stealthy attacker and Read More
7 Feb 2021News.Press releases.ThreatQuotient How ThreatQ Helps Bridge the Threat Hunting Skills GapHow ThreatQ Helps Bridge the Threat Hunting Skills Gap LIZ BUSH If you’re not familiar with the TAG Cyber Security Annual, you should be! Read More
6 Feb 2021Forcepoint.News Understanding Insider Threat Before the BreachTwo recent examples of insider threat show how incorrect information can lead to bad decisions. In one, a data scientist who previously tracked Read More
6 Feb 2021News.Opentext For many patients, telehealth is here to stayTelehealth has been a topic of discussion for decades in healthcare. While innovators in medicine and technology have long promoted the Read More
5 Feb 2021Micro Focus.News Strategically #BetterTogether – Micro Focus plus our Channel PartnersHow do we measure how strategic we are to our customers? Micro Focus uses double-blind competitive benchmarking in order to gauge how well we Read More
4 Feb 2021Carbon Black.News The State of Healthcare Cybersecurity: VMware Carbon Black Explores the Surge in Cyber ThreatsOn the frontline of the pandemic, perhaps no industry was impacted and forced to innovate and transform as quickly as healthcare in 2020. Whether Read More
3 Feb 2021News.Riverbed Data Security Challenges in the Rush to the Cloud | RiverbedIn their rush to the cloud, enterprises will need to take into consideration three new data security challenges as they reevaluate where their Read More
3 Feb 2021News.Riverbed Data Security Challenges in the Rush to the Cloud | RiverbedThe challenges of working from home have caused organizations to reevaluate how they look at their networks and the data that lives on them. The Read More
3 Feb 2021Cofense.News Emotet Disrupted but Likely to ReturnBackground Originally a banking Trojan, Emotet evolved to become more of a gateway for other malware families such as Ryuk, TrickBot, Read More
2 Feb 2021News.Titus HIPAA and 2021 Healthcare Data Security TrendsGeorgina Stockley · Tuesday, February 2nd, 2021 The ramifications of this year’s global pandemic will continue to drive unprecedented Read More
2 Feb 2021Forcepoint.News.Webinars How Cybersecurity Changed in 2020 and What it Means for 2021Now, as much of the world continues working from home, that means company data, networks and employees themselves are vulnerable to multiple Read More
2 Feb 2021BeyondTrust.News Understanding Sudo Vulnerability CVE-2021-3156 & How Privilege Management for Unix & Linux Can Help | BeyondTrustUnderstanding Sudo Vulnerability CVE-2021-3156 & How Privilege Management for Unix & Linux Can Help | BeyondTrust Free Privileged Account Read More
2 Feb 2021News.PROFITAP DNS – OR ALSO: WHY IS MY INTERNET NOT WORKING?This blog was written in collaboration with magellan netzwerke GmbH, A Profitap Partner. DNS – OR ALSO: WHY IS MY INTERNET NOT Read More
2 Feb 2021News.Qualys Unpacking the CVEs in the FireEye Breach – Start Here FirstIn a blog post on Dec. 22, 2020, Qualys revealed it has identified 7.5 million instances of vulnerability to the stolen FireEye Red Team Read More
1 Feb 2021NAKIVO.News How to Request SSL Certificates from a Windows Certificate Server for Hyper-VNAKIVO Blog > Hyper-V Administration and Backup > How to Request SSL Certificates from a Windows Certificate Server for Hyper-V February 1, Read More
1 Feb 2021McAfee.News Schrems II – A few Things to Keep in Mind!Alas, we have possibly never been so much away of such harmonization. 128 out of 194 countries have put in place legislation to secure the Read More
1 Feb 2021Micro Focus.News Inspiring students to imagine their future careersUnder Pressure For too long, there has been tremendous reliance on parents, schools and government to capture children’s imaginations – to help Read More
31 Jan 2021News.ThreatQuotient ThreatQuotient appoints Eutimio Fernandez as new Country Manager for SpainMadrid, January 29, 2021 – ThreatQuotient, a leader in Security Operations Platforms, today announced the appointment of Eutimio Fernandez Read More
31 Jan 2021News.Versasec For more than 70 years, Sandia National Labs has resolved the nation’s challenging security issues, and they turned to Versasec’s vSEC:CMS to solve their security migration challenges.Date: 2021-01-25Author: Carolina Martinez Previous << Effective Remote PKI Management For more than 70 years, Sandia has delivered Read More
30 Jan 2021Forcepoint.News Managing the Insider Threat – An ISF Panel DiscussionThe goal of the panel discussion was to explore insider threat and the impact it has on cybersecurity while offering tangible solutions for Read More
30 Jan 2021News.Opentext Digitalization in procurementA recent blog on ‘The resilient Procurement organization’ described the benefits of using OpenText™ Extended ECM for SAP® Read More
29 Jan 2021Micro Focus.News Data Privacy Day: Why Protecting Data Matters to Your Bottom LineWhen it comes to data privacy, who do consumers trust? A recent data privacy survey by McKinsey & Company asked 1,000 consumers to rank the Read More
28 Jan 2021Carbon Black.News VMware Carbon Black Champions Data Privacy Day 2021Today is Data Privacy Day, an annual effort hosted by the National Cybersecurity Alliance (NCSA) to raise awareness about the importance of Read More
27 Jan 2021Cofense.News Phish Found in Proofpoint-Protected Environments Week ending January 22, 2021Cofense solutions enable organizations to identify, analyze and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More
26 Jan 2021News.Titus 10 Tips to Protect Your Company´s Data in 2021Georgina Stockley · Monday, January 25th, 2021 The amount, complexity, and relevance of the data that companies handle has increased Read More
26 Jan 2021BeyondTrust.News Privilege Management for Unix & Linux Continues Rapid Growth by Securing Cloud Infrastructure | BeyondTrustPrivilege Management for Unix & Linux Continues Rapid Growth by Securing Cloud Infrastructure | BeyondTrust Free Privileged Account Discovery Read More
25 Jan 2021NAKIVO.News.Webinars Free Live Webinar – Save Your Seat Now!NAKIVO Blog > NAKIVO News > Free Live Webinar – Save Your Seat Now! January 19, 2021 by Grace Norman The adoption of Microsoft 365 has had Read More
24 Jan 2021News.Press releases.ThreatQuotient Threat hunting is now pervasive, learn how the ThreatQ Platform helps support your teamThreat hunting is now pervasive, learn how the ThreatQ Platform helps support your team LIZ BUSH As I mentioned in an earlier blog, threat Read More
23 Jan 2021Forcepoint.News Revolutionising Cybersecurity – SASE Special Report by RaconteurThere are six parts to the paper. It is interspersed with independent market data from the Ponemon Institute, Accelerate Technologies, Accenture Read More
23 Jan 2021News.Opentext We need to talk about contentLet’s start with a question: In the current focus on digital initiatives, are energy companies overlooking the importance of content? And, Read More
22 Jan 202125 Jan 2021News.ThreatQuotient THREATQUOTIENT WEBINAR: Empower the human element with Cyber Threat IntelligenceThe most important asset in your organization is your human resource, who will run the investigation, analyse the data and take actions on it. Read More
22 Jan 2021Micro Focus.News How Many COBOL Programmers Does it Take to Change a Lightbulb?COBOL’s continued popularity receives further evidence. Digital Marketing expert and avid COBOL fan Mark Plant reports that another major Read More
21 Jan 2021Carbon Black.News VMware Carbon Black Cloud™ Awarded Cyber Catalyst DesignationVMware Carbon Black Cloud has been awarded a Cyber CatalystSM designation for its cloud native endpoint and workload protection platforms, which Read More
19 Jan 2021BeyondTrust.News Protecting the Government Workforce of the Future with Secure Remote Access | BeyondTrustProtecting the Government Workforce of the Future with Secure Remote Access | BeyondTrust Free Privileged Account Discovery Tool: Identify & Read More
19 Jan 2021News.Qualys January 2021 Patch Tuesday – 83 Vulnerabilities, 10 Critical, One Zero Day, AdobeThis month’s Microsoft Patch Tuesday addresses 83 vulnerabilities. The 10 Critical vulnerabilities cover Windows codecs, Office, HEVC video Read More
18 Jan 2021News.Riverbed User Experience/App Performance vs. Network Security | Enterprise SD-WAN Trade-Offs | RiverbedIs it possible to meet user expectations and maintain SD-WAN security? One benefit of SD-WAN is that it makes it easy to steer certain traffic Read More
17 Jan 2021News.ThreatQuotient ThreatQuotient Named McAfee’s Global Security Innovation Alliance Partner Of The Year For Second Consecutive YearDepth of integrations, early MVISION Marketplace launch, and the most deal closures within SIA programs distinguishes ThreatQuotient among McAfee Read More
17 Jan 2021News.Versasec As remote workforces grow, managing PKI devices is still simple and effectiveDate: 2021-01-12Author: Anders Adolfsson and Michael Samara Previous << Microsoft Store Due to the 2020 global pandemic, companies are Read More
16 Jan 2021Forcepoint.News Top 10 To The Point Cybersecurity Podcast Episodes of 2020And without further ado, here’s the Top 10 episodes of 2020: Be one of the first 10 to share the episode or this blog and receive your Read More
16 Jan 2021News.Opentext 7 information challenges impacting the semiconductor boom in 2021While the worst of the COVID-19 pandemic slowed the semiconductor sector, it is now recovering and can look forward Read More
15 Jan 2021Micro Focus.News INSPIRE 20 Podcast: Meet Morag Lucey of TeleverdeIt’s back, the INSPIRE 20 podcast returns today with Morag Lucey, CEO of Televerde, a company built on second chances. This forward thinking Read More
14 Jan 2021Carbon Black.News.Webinars Bridge the Gap between Security and IT in Cloud Workload ProtectionIt often feels as though Security and IT are trying to build the same house from different blueprints. Security works tirelessly to stay ahead of Read More
14 Jan 202121 Jan 2021I4P.News Encryption resolution adoptedThe Council of Europe has adopted a resolution on encryption that states that competent authorities must be able to access encrypted data in a Read More
13 Jan 2021Checkmarx.News CVE-2020-35774: twitter-server XSS Vulnerability DiscoveredAfter researching twitter-server, the Checkmarx Security Research Team discovered a reflected cross-site scripting (XSS) vulnerability, assigned Read More
13 Jan 2021Cofense.News Coronavirus Screening and Testing, and a Sense of Urgency Among EmployeesThe Cofense PDC (Phishing Defense Center) has seen a continuous campaign by malicious actors exploiting the COVID-19 pandemic by using cleverly Read More
12 Jan 2021BeyondTrust.News How to Manage Your CI/CD Toolset Secrets with One Solution: 6 Benefits of DevOps Secrets Safe | BeyondTrustHow to Manage Your CI/CD Toolset Secrets with One Solution: 6 Benefits of DevOps Secrets Safe | BeyondTrust Free Privileged Account Discovery Read More
11 Jan 2021Ivanti.News 5G and the Journey to the EdgeRecently, AT&T Cybersecuritypublished important findings in the tenth edition of their Insights report entitled, “ 5G and the Journey to the Read More
11 Jan 2021McAfee.News McAfee Welcomes its ISO 27701 Certificate!At McAfee, we adhere to a set of core values and principles – We Put the Customer at The Core, We Achieve Excellence with Speed and Read More
10 Jan 2021News.ThreatQuotient Perseverance. Pushing Security Operations Forward in 2021We Have the Capabilities to Persevere and Reach the Next Level of Security Maturity For obvious reasons, perseverance has been the theme for 2020 Read More
10 Jan 2021FireEye.News Excelerating Analysis – Tips and Tricks to Analyze Data with Microsoft ExcelIncident response investigations don’t always involve standard host-based artifacts with fully developed parsing and analysis tools. At FireEye Read More
9 Jan 2021Forcepoint.News Looking Back at December’s To The Point Cybersecurity Podcast EpisodesForcepoint To The Point Cybersecurity In December, To The Point Cybersecurity podcast featured discussions with government cyber leaders on Read More
9 Jan 2021News.Opentext Evolving customer communicationsTargeted customer communications are a powerful way to increase engagement and build brand loyalty. Done poorly, Read More
7 Jan 2021McAfee.News The Road to XDRThe Building Pressure for XDR Let’s start with why XDR? The cry for XDR reflects where cybersecurity is today with fragmented, Read More
6 Jan 2021FireEye.News Leveraging Smart Launcher to Evade the EvadersSmart Launcher is a technology designed by FireEye to rapidly upgrade and modify the FireEye MVX sandbox technology used in our Network Security Read More
6 Jan 2021Cofense.News All I Wanted Was for 2020 to End2020 was far from ordinary. By Dylan Duncan Every year, we see threat actors improve their methods and adapt to world events, bringing new Read More
5 Jan 2021News.Qualys Technical Deep Dive Into SolarWinds BreachMany organizations have been compromised by the recent SolarWinds breach, which seems to be a targeted attack against both government and private Read More
5 Jan 2021Centrify.News RSS is deletedThis RSS is deleted because you didn’t use it for long time. Please consider purchasing one of our PRO plans to prevent this in the future Read More
4 Jan 2021NAKIVO.News Why You Shouldn’t Use SharePoint Online as a DatabaseNAKIVO Blog > Office 365 Administration and Deployment > Why You Shouldn’t Use SharePoint Online as a Database December 28, 2020 by Michael Read More
3 Jan 2021News.Riverbed Maximizing Network and Application Performance and Visibility: TFD22 Recap | RiverbedThe last three months may have been a whirlwind of activity for you. Many organizations are trying to wind down projects, wrap up the spending on Read More
2 Jan 2021Forcepoint.News Welcome to the Unbound EnterpriseUnderstanding the Need for the Unbound Enterprise Unbound Work Requires Unbound Security Getting to unbound depends on a corporate leadership Read More
31 Dec 2020Indeed Identity.News Roundtable: Evolution of Trust. Get ready for PKI 2.0In the digital era, PKI is one of the most effective technologies for authentication of users and devices that is used by worldwide companies for Read More
30 Dec 2020Checkmarx.News Preventing Developer Burnout in the Age of Rapid Software DeliveryThis increased pace and immense pressure surrounding software development have made burnout an even bigger reality than before, at a time when Read More
30 Dec 2020Cofense.News Emotet is Back for the Holidays with Updated TacticsAfter a lull of nearly two months, the Emotet botnet has returned with updated payloads. The changes are likely meant to help Emotet avoid Read More
29 Dec 2020BeyondTrust.News.Webinars 15 Most Popular Cybersecurity Webinars of 2020: BeyondTrust Edition | BeyondTrust15 Most Popular Cybersecurity Webinars of 2020: BeyondTrust Edition | BeyondTrust December 28, 2020 Open You May Also Be Interested In: Our Read More
29 Dec 2020News.Qualys Qualys Security Advisory: SolarWinds / FireEyeQualys Researchers found Millions of devices exposed to vulnerabilities used in the stolen FireEye Red Team tools and SolarWinds Orion by Read More
28 Dec 2020NAKIVO.News Data Backup Solutions: The Most Trending Features in 2021NAKIVO Blog > NAKIVO Backup & Replication > Data Backup Solutions: The Most Trending Features in 2021 December 24, 2020 by Grace Norman Read More
27 Dec 2020News.Press releases.ThreatQuotient Know More about the Impact of the SolarWinds Breach on your Environment with ThreatQKnow More about the Impact of the SolarWinds Breach on your Environment with ThreatQ ROSS HAMMER With the recent compromise announcement from Read More
27 Dec 2020News.Versasec The Popular vSEC:TOOL K-Series is Now Available in the Microsoft StoreNow available in the Microsoft Store, vSEC:TOOL K-Series Helps Users Evaluate PKI credential rollout plans. Apple started their App Store 12 Read More
26 Dec 2020Forcepoint.News.Webinars Grant Thornton – Insider Threat Q&AQ: As insider threat increases at an alarming rate, it continues to be one of the most challenging problems for organizations to solve. Do you Read More
24 Dec 2020Carbon Black.News Enterprise EDR Expands New Linux Coverage to SUSE, OpenSUSE, Ubuntu, Oracle & Amazon LinuxVMware Carbon Black is pleased to announce an exciting expansion of Linux distribution coverage for Enterprise EDR users on the VMware Carbon Read More
24 Dec 2020Gartner.McAfee.News Finally, True Unified Multi-Vector Data Protection in a Cloud WorldAccording to a report by Gartner earlier in 2020, 88% of organizations have encouraged or required employees to work from home. And a report from Read More
23 Dec 2020Checkmarx.News 2020 Checkmarx Partner Awards – APJ, EMEA & LATAM2020 has been a year like no other and it has certainly demonstrated just how creative, determined, and committed our partners are as they have Read More
23 Dec 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week ending December 18, 2020Cofense solutions enable organizations to identify, analyze and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More
22 Dec 2020BeyondTrust.News Least Privilege Application Management – A Lesson Learned from SolarWinds Orion | BeyondTrustLeast Privilege Application Management – A Lesson Learned from SolarWinds Orion | BeyondTrust December 22, 2020 Open You May Also Be Read More
22 Dec 2020News.Qualys Adobe Flash Player Reaches End of Life on December 31, 2020In July 2017, Adobe announced that Adobe Flash Player will reach “End of Life” (EOL) on Thursday, December 31, 2020. After this date, Adobe Flash Read More
21 Dec 2020NAKIVO.News Tips and Tools for Microsoft Hyper-V MonitoringNAKIVO Blog > Hyper-V Administration and Backup > Tips and Tools for Microsoft Hyper-V Monitoring December 17, 2020 by Michael Bose The Read More
21 Dec 2020McAfee.News 3 Reasons Why Connected Apps are Critical to Enterprise SecurityWhat are Connected Apps? Collaboration platforms such as Office 365 enable teams and end-users to install and connect third-party Read More
20 Dec 2020News.ThreatQuotient Focusing the SOC on Detection and ResponseThreat Intelligence is the Foundation and Lifeblood of the Security Operations Center We all know the security industry mantra: it’s not a Read More
20 Dec 2020FireEye.News Direct Access to Threat Intelligence With Mandiant AdvantageOur customers and partners have been asking for an easier way to stay informed of threat intelligence announcements. To address this need, Read More
20 Dec 2020News.Versasec Interview with DigiCert. What does the future of PKI look like? Why are DigiCert ONE and Versasec vSEC:CMS such a great fit?Date: 2020-12-18Author: Anders Adolfsson, Versasec Technical Consultant Previous << Team Building in the time of Covid Versasec integrates Read More
20 Dec 2020Allied Telesis.News Public Wi-Fi Security Best PracticesThe common experience of public Wi-Fi is usually frustrating and unreliable due to the cumbersome and repetitive authentication process. In Read More
19 Dec 2020Forcepoint.News.Webinars Understanding Negative Workplace Behaviors (and What You Can Do About it)At some point, we all behave in ways that expose organizations to risk. Negative workplace behaviors contribute to organizational risk, as these Read More
19 Dec 2020News.Opentext Navigating business recovery with AIWith the dramatic changes brought on by COVID-19, businesses are having to adapt to remote working, reduced budgets, and Read More
19 Dec 2020Centrify.News Centrify goes 3-for-3 as a PIM Leader in 2020This week, The Forrester Wave™: Privileged Identity Management, Q4 2020 report was published and Centrify was named a Leader among the 10 Read More
18 Dec 2020FireEye.News DebUNCing Attribution: How Mandiant Tracks Uncategorized Threat ActorsMany people are hearing the term UNC for the first time after we published details of a threat group we refer to as UNC2452. “UNC” groups—or Read More
18 Dec 2020News.Riverbed Bandwidth Cost vs. App Performance | Enterprise SD-WAN Trade-Offs | RiverbedSD-WAN makes it easy to incorporate less-costly bandwidth options like Internet Broadband and LTE at remote locations. What are the Read More
18 Dec 2020News.Riverbed Bandwidth Cost vs. App Performance | Enterprise SD-WAN Trade-Offs | RiverbedSD-WAN makes it easy to incorporate less-costly bandwidth options like Internet Broadband and LTE at remote locations. What are the Read More
18 Dec 2020Micro Focus.News INSPIRE 20 Podcast: Putri Realita, DanoneToday, we are sharing one last excellent INSPIRE 20 podcast before our team takes a well-deserved holiday break – and we hope you enjoy the same! Read More
17 Dec 2020Indeed Identity.News Pacific Tech and Indeed Identity announce strategic partnershipPacific Tech and Indeed Identity enter into a partnership that brings together Indeed Identity cutting-edge cybersecurity products and Pacific Read More
17 Dec 2020McAfee.News How OCA Empowers Your XDR JourneyXDR Promise Let’s start with an understanding of XDR. There is a range of XDR definitions but at the end of day there are core desired Read More
16 Dec 202016 Dec 2020Netwrix.News.Vendors Data Security in 2021: Lessons Learned Looking Back and What to Expect Looking ForwardLive Webinar on Thursday, December 17 at 10am GMT/11 am CET. No one has a crystal ball that reveals exactly what data security challenges we’ll Read More
16 Dec 2020FireEye.News Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST BackdoorExecutive Summary We have discovered a global intrusion campaign. We are tracking the actors behind this campaign as UNC2452. FireEye discovered Read More
16 Dec 202016 Dec 2020Group-IB.News.Vendors Egregor ransomware: white paper & webinarRegardless of how big or protected your company may be, ransomware remains a very real threat. Egregor, a ransomware family that appeared just in Read More
16 Dec 2020Checkmarx.News 2021 Software Security Predictions: Our Experts Weigh InNevertheless, with all of the adjustments that took place, the world of cyber attacker vs. cyber defender did not change much, other than the Read More
16 Dec 2020Cofense.News Strategic Analysis: Agent Tesla Expands Targeting and Networking CapabilitiesThreat actors who transition to this version of Agent Tesla gain the capability to target a wider range of stored credentials, including those Read More
15 Dec 2020Forcepoint.News.Webinars Indicators of Behavior (IOBs) – With 2020 VisionQ: How are Indicators of Behavior different than Indicators of Compromise?A: It is important to look at Indicators of Behavior because we, as an Read More
15 Dec 2020BeyondTrust.News Remote Support for Zebra Mobile Devices | BeyondTrustRemote Support for Zebra Mobile Devices | BeyondTrust December 14, 2020 Open You May Also Be Interested In: Our website uses cookies to provide a Read More
15 Dec 2020News.Qualys FireEye Breach Leveraged SolarWinds Orion SoftwareOn December 8, 2020, FireEye disclosed theft of their Red Team assessment tools. FireEye has confirmed the attack leveraged trojanized updates to Read More
14 Dec 2020NAKIVO.News What Type of a Remote Sysadmin Are You?With only a few weeks left till 2021, we can definitely say that 2020 was the most challenging year in decades. One of the most unexpected things Read More
14 Dec 2020Gartner.McAfee.News 10 Reasons to Celebrate 20201. January 2020 Gartner Peer Insights VOC Customers’ Choice for CASB Everyone deserves a break after surviving this past year and I Read More
13 Dec 2020News.Press releases.ThreatQuotient The Evolution of Threat Intelligence PlatformsThe Evolution of Threat Intelligence Platforms CYRILLE BADEAU Initially designed to compensate for the heterogeneity and volume of external Read More
12 Dec 2020Forcepoint.News.Webinars Next Week – Hear from Cybersecurity Industry Leaders at Forcepoint Exchange: Futures and InsightsIt’s time to get ahead Forcepoint Exchange: Futures and Insights Join sessions ‘A Necessary Change in the Data Protection Mindset’ and ‘Slackers, Read More
12 Dec 2020News.Opentext OpenText funds 4 million meals this holiday season2020 has been a most challenging year, and food insecurity has dramatically increased over the last year globally. In Canada alone: 2 Million Read More
11 Dec 2020FireEye.News FireEye Shares Details of Recent Cyber Attack, Actions to Protect CommunityFireEye is on the front lines defending companies and critical infrastructure globally from cyber threats. We witness the growing threat Read More
11 Dec 2020Ivanti.News December Patch Tuesday 2020For all of you who have asked for a pause to Patch Tuesday, you did not get exactly what you wanted for Christmas, but close. December Patch Read More
11 Dec 2020Micro Focus.News Amazing Grace Hopper – HAPPY BIRTHDAYWhen a bright, 30-something persuaded the authorities to waive the restrictions on age and weight, and joined the US Navy in 1944, no-one could Read More
10 Dec 2020Carbon Black.News Protect Yourself from Holiday Cyber Threats – Ask the Howlers, Episode 16 HighlightsIn episode 16 of “Ask the Howlers,” host Stacia Tympanick, senior solution engineer, met up with Ryan Hendricks, staff architect and Read More
10 Dec 2020McAfee.News Securing Containers with NIST 800-190 and MVISION CNAPPAs more enterprises adapt to cloud-native architectures and embark on multi-cloud strategies, demands are changing usage patterns, processes, and Read More
9 Dec 2020FireEye.News Unauthorized Access of FireEye Red Team ToolsOverview A highly sophisticated state-sponsored adversary stole FireEye Red Team tools. Because we believe that an adversary possesses these Read More
9 Dec 2020Checkmarx.News Seven Ways We’ve Helped our Partners Transform to Digital Reality During COVIDAmong organizations that experienced a sudden and dramatic interruption to “business as usual” were the many resellers that market software Read More
9 Dec 2020Cofense.News You Must Quarantine! Fake Office 365 Email Leads to CuriosityThe Cofense Phishing Defense Center (PDC) has discovered a recent phishing campaign that has targeted Office 365 users and includes a convincing Read More
8 Dec 2020Forcepoint.News Zero Trust Network Access (ZTNA) Replaces Implicit Trust with Explicit TrustCloud applications were no problem for newly remote workers to get to (which provided a lot of motivation to switch to SaaS apps where possible). Read More
8 Dec 2020BeyondTrust.News Demystifying Azure PIM: What it is, How it Works, What it Doesn’t Do | BeyondTrustDemystifying Azure PIM: What it is, How it Works, What it Doesn’t Do | BeyondTrust December 7, 2020 Open You May Also Be Interested In: Our Read More
7 Dec 2020Micro Focus.News Escape Endless Implementation with Micro Focus Enterprise Service ManagementCompanies are relying on Service Desks more than ever in this pandemic. More employees are working from home and do not have access to their Read More
6 Dec 2020News.Press releases.ThreatQuotient The ThreatQ Platform: Powering the XDR MovementThe ThreatQ Platform: Powering the XDR Movement MARC SOLOMON In my previous blog, I talked about the integration imperative for Extended Read More
6 Dec 2020FireEye.News Protecting Healthcare and Academia Against Cyber ThreatsAs the COVID-19 pandemic continues, cyber threats have worsened for several industries across the globe. Universities with medical and research Read More
6 Dec 2020News.Versasec Versasec at APEX 2020Date: 2020-11-30Author: Joakim Thorén, CEO Previous << Expand WHfB We are excited to be a part of the annual Apica Performance Excellence Read More
5 Dec 2020Forcepoint.News Automated Forcepoint NGFW High Availability with Azure Resource ManagerThis is why Forcepoint developed an Azure Resource Manager template which deploys a redundant stack of Forcepoint Next Generation Firewall Read More
5 Dec 2020News.Opentext The Future of Cyber Resilience—Enfuse On Air 2020The Future of Cyber Resilience – Click Here to View the Keynote OpenText’s 20th annual Enfuse conference—the cybersecurity and Read More
4 Dec 2020News.ThreatMark ThreatMark named in the RegTech100We’re proud to announce that ThreatMark has been included in the RegTech100 for 2021. The 2021 RegTech100 is launched by specialist research firm Read More
4 Dec 2020FireEye.News Informed Decision Making Regardless of the Tools or Controls in UseThe cyber security industry has been its own enemy as each security vendor focuses on their own specific toolset and unique detection algorithm, Read More
4 Dec 2020Micro Focus.News INSPIRE 20 Podcast: Anna Mok, Ascend LeadershipHappy Monday, and welcome back from the Thanksgiving holiday, for all of our US friends that celebrated! We are kicking the week off feeling Read More
3 Dec 2020Carbon Black.News A Look Ahead: 9 Cybersecurity Predictions for 2021Following an unprecedented year, what’s to come for cybersecurity in 2021? The ripple effects of the global pandemic have created a new Read More
3 Dec 2020McAfee.News Think Beyond the Edge: Why SASE is Incomplete Without Endpoint DLPOrganizations have been in the midst of digital transformation projects for years, but this development represented a massive test. Most Read More
3 Dec 2020News.Riverbed Speed CAD File Downloads | Improve CAD Application Performance | RiverbedWhy design professionals at architectural, engineering, construction and related firms struggle with running CAD applications remotely—and how to Read More
2 Dec 2020FireEye.News Using Speakeasy Emulation Framework Programmatically to Unpack MalwareAndrew Davis recently announced the public release of his new Windows emulation framework named Speakeasy. While the introductory blog post Read More
2 Dec 2020Checkmarx.News How Agencies Can Take Advantage of DevSecOps and Automation to Accelerate ATOsTo discuss how agencies can take advantage of DevSecOps, while meeting their ATO and security requirements in the same timely fashion, Checkmarx Read More
2 Dec 2020News.PROFITAP Preventing Network Downtime during Black FridayThe shopping spree starting on Black Friday, rolling over to Cyber Monday is one of the most critical times for Logistics centers, optimized Read More
2 Dec 2020Cofense.News The New Cofense Resource CenterToday, Cofense officially launched its new Resource Center. Formerly known as Community, the new Resource Center features a completely redesigned Read More
1 Dec 2020BeyondTrust.News Is Your Remote Access Strategy Adapted for the New Normal? | BeyondTrustIs Your Remote Access Strategy Adapted for the New Normal? | BeyondTrust November 30, 2020 Open You May Also Be Interested In: Our website uses Read More
1 Dec 202021 Jan 2021I4P.News Noreg – new i4p reselling partnerWe’re delighted to welcome one of the best known IT security integrators on the Hungarian market Noreg as an i4p reselling partner. We’ve Read More
1 Dec 2020News.Qualys Qualys Research Nominated for Pwnie Awards 2020The Qualys Security Advisory team has been nominated for five Pwnie Awards this year in three different categories. In addition to nominations Read More
29 Nov 2020News.Niagara Networks SecOps Blind sighted!?Privacy, both in the physical and online world, is one of the things most people value dearly. With the inevitable shift from physical locations Read More
29 Nov 2020FireEye.News A Look Back and a Look Forward: Cyber Security in 2021With 2020 coming to an end, we’ve released our 2021 cyber security predictions report, videos with our senior leaders and more. I asked Major Read More
28 Nov 2020News.Opentext 10 Reasons to upgrade OpenText Content Suite and Extended ECMReason #1: Cloud Editions In a recent Forrester Consulting Study, it was revealed that 64% of organizations that store all their content Read More
27 Nov 2020News.ThreatMark ThreatMark Recognized in Deloitte’s Top Technology Fast 50 for Central EuropeThreatMark has been included in Deloitte’s 2020 Technology Fast 50 CE – list honoring the most innovative and fastest-growing technology Read More
27 Nov 2020FireEye.News FireEye Options for Symantec CustomersCustomers of Symantec enterprise solutions continue to feel the impact of Broadcom’s acquisition. After Broadcom discontinued Symantec Endpoint Read More
27 Nov 2020Micro Focus.News GreenLight Group’s GITOpS – what is it and why does it matter?What is GITOpS (and why does it matter)? Operations is the lifeblood of every IT department, and for most IT managers it’s also the bane of their Read More
26 Nov 2020Carbon Black.News 3 Ways to Hunt for the ZeroLogon Vulnerability on Your Windows ServersVulnerability assessment and patch management can be painful time-consuming processes. From the Security team looking at vulnerability reports Read More
25 Nov 2020FireEye.News Election Cyber Threats in the Asia-Pacific RegionIn democratic societies, elections are the mechanism for choosing heads of state and policymakers. There are strong incentives for adversary Read More
25 Nov 2020Checkmarx.News Drupal Core: Behind the VulnerabilityThis article covers the technical facets of CVE-2020-13663 that were made public by Checkmarx in June 2020, but whose details were never Read More
25 Nov 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week ending November 20, 2020Cofense solutions enable organizations to identify, analyze and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More
24 Nov 2020News.Titus 7 technologies to help your business with GDPR complianceTeam Titus · Monday, November 23rd, 2020 In today’s global economy, businesses must be compliant with standards established by various Read More
24 Nov 2020BeyondTrust.News How Do the 10 Top Privileged Identity Management (PIM) Vendors Stack Up? See Evaluation & Ranking | BeyondTrustHow Do the 10 Top Privileged Identity Management (PIM) Vendors Stack Up? See Evaluation & Ranking | BeyondTrust November 19, 2020 Open You Read More
23 Nov 2020NAKIVO.News SharePoint vs. SharePoint Online: A Full ComparisonNAKIVO Blog > NAKIVO Backup & Replication > SharePoint vs. SharePoint Online: A Full Comparison November 19, 2020 by Michael Bose Read More
23 Nov 2020McAfee.News What Truebill and Other Financial Apps Have in Common With EDRThen I got to thinking about these new apps that I can’t imagine why anyone would need to use – UNTIL I decided to try Read More
22 Nov 2020News.Press releases.ThreatQuotient The Integration Imperative for XDRThe Integration Imperative for XDR MARC SOLOMON In my previous blog, I talked about the need for a conduit between Extended Detection and Read More
22 Nov 2020FireEye.News FireEye is the Intelligent Choice for Symantec ReplacementStop breaches in their tracks Each desktop, laptop and server is a possible entry for a breach, leaving your data, customer information and Read More
21 Nov 2020Forcepoint.News There’s Still Time to Register for Next Week’s SD-WAN and SASE SummitLike other events over the last several months, this year’s Summit has gone fully digital so you can attend no matter where you are based. SD-WAN Read More
21 Nov 2020News.Opentext Why innovation must be the new reality for government IT from January 2021 It’s almost ten years since the failed launch of healthcare.gov. This event served to cruelly expose what Read More
21 Nov 2020Centrify.News Ping and Centrify – Layering Identity Security Into DevOps [Webinar November 18]As has been well documented, security is often not the main focus for DevOps. The restrictions created by traditional methods of securing Read More
20 Nov 2020FireEye.News Purgalicious VBA: Macro Obfuscation With VBA PurgingMalicious Office documents remain a favorite technique for every type of threat actor, from red teamers to FIN groups to APTs. In this blog post, Read More
20 Nov 2020Micro Focus.News Smart changes in storeIntroduction A recent Forbes article commented, “COVID-19 will be remembered for many things and what’s becoming indisputable is how it is Read More
19 Nov 2020cPacket Networks.News cPacket Networks Deepens Cloud Offering with AWS Gateway Load BalancerThe post cPacket Networks Deepens Cloud Offering with AWS Gateway Load Balancer appeared first on cPacket Networks.Read More
19 Nov 2020Carbon Black.News VMware Carbon Black Announces Splunk Integration to Streamline and Modernize SOC WorkflowsIntroducing Unified VMware Carbon Black Cloud App for Splunk At VMware Carbon Black, our ecosystem of integration and alliance partners has Read More
19 Nov 2020Gartner.McAfee.News McAfee MVISION Solutions Meet FedRAMP Cloud Security RequirementsThis FedRAMP Moderate designation is equivalent to DoD Impact Level 2 (IL2) and certifies that the McAfee solution has passed rigorous security Read More
18 Nov 2020FireEye.News Find and Verify Threats in Splunk Phantom With FireEye Detection On DemandThreats can and do come from everywhere, and every organization approaches security differently based on their needs, industry and environment. Read More
18 Nov 2020Checkmarx.News Apache Unomi CVE-2020-13942: RCE Vulnerabilities DiscoveredGiven that Unomi contains an abundance of data and features tight integrations with other systems, making it a highly desired target for Read More
18 Nov 2020News.Riverbed Maximizing Network and Application Visibility and Performance | RiverbedNow as most IT professionals will attest, that’s not an easy thing to do, especially in complex hybrid cloud environments. But that’s where Read More
18 Nov 2020News.Riverbed Maximizing Network and Application Visibility and Performance | RiverbedWhen I joined Riverbed in October 2019, one of my first priorities was to present a clear vision and strategy for the company going into 2020. Read More
18 Nov 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week ending November 13, 2020Cofense solutions enable organizations to identify, analyze, and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More
17 Nov 202021 Jan 2021I4P.News i4p’s participation at RISK 2020It was a pleasure to have participated at REAL security’s RISK conference 2020. This leading IT security event for the Adriatic region went Read More
17 Nov 2020Forcepoint.Gartner.News Forcepoint Recognized by Gartner for 4th Straight Year as a Visionary in Network FirewallsWe designed Forcepoint NGFW to help enterprises and government agencies securely connect their offices, branches, private clouds and other sites Read More
17 Nov 2020BeyondTrust.News Stop Ransomware Attacks like RYUK with a Preventative Endpoint Security Approach | BeyondTrustStop Ransomware Attacks like RYUK with a Preventative Endpoint Security Approach | BeyondTrust November 16, 2020 Open You May Also Be Interested Read More
17 Nov 2020News.Qualys An End-to-End Approach to Next-Gen Web Application and API SecurityIt was almost 10 years ago that Marc Andreessen wrote that software is eating the world. It is still true today, but I would be even more Read More
17 Nov 2020Centrify.News Simplifying Access to Servers Using Tools You Are Familiar WithProviding privileged access to servers can be challenging, given the requirements to both grant access to authorized IT staff as well as protect Read More
16 Nov 2020Gartner.McAfee.News SOCwise: A Security Operation Center (SOC) Resource to BookmarkMeet the SOCwise From Michael Leland, Technical Director of Security Operations, McAfee From the perspective of a ‘legacy SIEM’ guy I Read More
15 Nov 2020News.ThreatQuotient The Term “Threat Intelligence” is Poisoned. It Does Not Mean What You Think it Means.I’m guessing the creators of the movie The Princess Bride had no idea that Inigo Montoya’s quote – You keep Read More
14 Nov 2020Forcepoint.News Future Insights – The Rise of Insider Threat-as-a-ServiceWhen envisioning the threats to your organization, malicious nation states or greedy virtual thieves located halfway around the world might loom Read More
14 Nov 2020News.Opentext 5 Content Suite and Extended ECM highlights from OpenText World 2020OpenText™ World 2020 offered insights from leading experts to help rethink the challenges facing your business. Learn how to best harness Read More
13 Nov 2020FireEye.News A Global Reset: Cyber Security Predictions 2021For most of us, 2020 was one of the most challenging years in recent memory. We struggled to deal with big changes in our personal lives and were Read More
12 Nov 2020Carbon Black.News VMware Carbon Black Named a Finalist in the 2020 CRN Tech Innovator AwardsWe are proud to announce that CRN®, a brand of The Channel Company, has named VMware Carbon Black a finalist in the 2020 CRN Tech Innovator Read More
12 Nov 2020McAfee.News How CASB and EDR Protect Federal Agencies in the Age of Work from HomeMcAfee’s global network of over a billion threat sensors affords its threat researchers the unique advantage of being able to thoroughly Read More
11 Nov 2020Checkmarx.News Checkmarx Solutions Now Available for Purchase on AWS MarketplaceIn case you’re unfamiliar, AWS Marketplace is a curated, digital catalogue that helps customers around the globe find, buy, and use third-party Read More
11 Nov 2020Ivanti.News November Patch Tuesday 2020Microsoft has released updates resolving a total of 112 unique common vulnerabilities and exposures (CVEs) this month. This puts us back up over Read More
11 Nov 2020Cofense.News Variants of Emotet MalwareThe Cofense Phishing Defense Center (PDC) team has seen a resurgence in the number of Emotet variants in the past few months, with the majority Read More
10 Nov 2020BeyondTrust.News Service Accounts – Don’t Overlook this Hidden Privilege Access Risk | BeyondTrustService Accounts – Don’t Overlook this Hidden Privilege Access Risk | BeyondTrust November 9, 2020 Open You May Also Be Interested In: Our Read More
10 Nov 2020News.Qualys The Evolution of the Qualys Cloud PlatformThe global pandemic has upended everything, and in the cyber security world in particular it has highlighted the need for organizations to have a Read More
10 Nov 2020Centrify.News Ephemeral Tokens vs. IDs and Passwords: A Simple Choice for DevOps?Static IDs and passwords have been around for decades, and for all the talk about getting rid of them, big pockets remain. Sure, for human login Read More
9 Nov 2020NAKIVO.News Everything You Wanted to Know about SharePointNAKIVO Blog > Office 365 Administration and Deployment > Everything You Wanted to Know about SharePoint November 9, 2020 by Michael Bose Read More
8 Nov 2020FireEye.News Ransomware: The Threat We Can No Longer Afford to IgnoreCybercrime is a billion-dollar industry that is consistently evolving. Innovation is at the heart of these criminal acts—hackers and fraudsters Read More
7 Nov 2020Forcepoint.News IDG Study – Protecting the Human Side of CybersecurityEmployees are Remote, Data is Everywhere According to a recent survey conducted in May 2020 by IDG of over 100 IT leaders, one major problem is Read More
7 Nov 2020News.Opentext Boost your digital fitness for cyber resilience in 2020 – and beyondDuring this tumultuous year, digital tools have let us keep working even as we’ve shuttered once-busy office spaces, moved by the millions Read More
7 Nov 2020Centrify.News Externalizing Credential Management for ITOM and ITSMOver the years, a pretty simple causality has emerged that represents one of the most significant security risks for organizations: PRIVILEGED Read More
6 Nov 2020FireEye.News Malicious File Transfer: What You Need To Know About an Attacker’s Methods and Techniques To Protect Your Organization From MalwareOne of the most effective ways for threat actors to infiltrate a network’s defenses is through the use of malware. As I discussed in our Security Read More
6 Nov 2020Micro Focus.News Micro Focus is Strategically Winning!How do we measure how strategic we are to our customers? Micro Focus uses double-blind competitive benchmarking in order to gauge how well we are Read More
5 Nov 2020Carbon Black.News.Webinars Countering a Home Invasion: Modernizing Threat Hunting Best PracticesThe recently released VMware Carbon Black Global Incident Threat Report found that incidents of counter incident response (IR) are occurring in Read More
5 Nov 2020McAfee.News.Webinars SPOTLIGHT: Women in CybersecurityThe RSA Conference USA 2019 held in San Francisco — which is the world’s largest cybersecurity event with more than 40,000 Read More
5 Nov 2020Allied Telesis.News Technology Surges Due to COVID-19Technology in healthcare often refers to cutting-edge treatments, or advanced, top-of-the-line medical devices and procedures. The COVID-19 Read More
4 Nov 2020FireEye.News Live off the Land? How About Bringing Your Own Island? An Overview of UNC1945Through Mandiant investigation of intrusions, the FLARE Advanced Practices team observed a group we track as UNC1945 compromise managed service Read More
4 Nov 2020Checkmarx.News Erez Yalon: A Security Leader in the API EconomyTo spread awareness around API risks and encourage developer secure coding practices when using APIs, Erez Yalon, Checkmarx’s Director of Read More
4 Nov 2020Cofense.News At the User’s Expense: Threat Actors Weaponize Companies’ Employee Reimbursements During the PandemicWith the health crisis that is COVID-19, employees are dutifully working from home. While some already had home offices decked out with dual Read More
3 Nov 2020BeyondTrust.News Top Cybersecurity Trends tor 2021: The Hacking of Time, M/L Data Poisoning, AI Attacks, & More | BeyondTrustTop Cybersecurity Trends tor 2021: The Hacking of Time, M/L Data Poisoning, AI Attacks, & More | BeyondTrust October 27, 2020 Open You May Read More
3 Nov 2020News.Riverbed Network Visibility’s Impact on Performance, Productivity and Security | Federal Government IT Study | RiverbedEvery federal IT manager wants to deliver the best end-user experience for their employees and agency, including a reliable network Read More
2 Nov 2020NAKIVO.News A Sysadmin’s Worst NightmaresNAKIVO Blog > NAKIVO Backup & Replication > A Sysadmin’s Worst Nightmares October 30, 2020 by Grace Norman Feeling like the world is Read More
2 Nov 2020Gartner.McAfee.News McAfee Named a Leader in the 2020 Gartner Magic Quadrant for CASBCloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and Read More
1 Nov 2020Gartner.News.Press releases.ThreatQuotient From the Trenches, Part 2: Working with Employees to Strengthen Security PostureFrom the Trenches, Part 2: Working with Employees to Strengthen Security Posture Liz Bush During COVID-19 and the shift to a remote work Read More
1 Nov 2020FireEye.News Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening, and ContainmentUPDATE (Oct. 30, 2020): We have updated the report to include additional protection and containment strategies based on front-line visibility and Read More
31 Oct 2020Forcepoint.News Cybercriminals Exploit Brazil’s PIX Instant Payment Platform in New Phishing AttackThe largest campaign we have uncovered, with over 4,000 phishing emails sent (and blocked by Forcepoint Email Security) on 21st October 2020, Read More
31 Oct 2020News.Opentext Join us for OpenText Enfuse On AirEnfuse On Air 2020 is the premier conference focused on prevention, detection and investigation of threats. Every Tuesday between November Read More
30 Oct 2020FireEye.News Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware ChaserThroughout 2020, ransomware activity has become increasingly prolific, relying on an ecosystem of distinct but co-enabling operations to gain Read More
30 Oct 2020Micro Focus.News Plotting your DX strategy in the new normalDX: Get Serious Have you seen the pandemic internet joke? It asks, “Who has driven Digital Transformation the most?” Options A and B are CEO and Read More
29 Oct 2020Carbon Black.News Cybersecurity Awareness Month: 2020 in RetrospectFor cyber defenders worldwide, 2020 has been unprecedented year. CISOs and their security teams have battled increased attack volumes and data Read More
28 Oct 2020FireEye.News Endpoint Security on the Developer HubGreat news: FireEye Endpoint Security is now available on the Developer Hub! Head over to the Developer Hub page now to explore the Endpoint Read More
28 Oct 2020Checkmarx.News Cybersecurity Awareness Month Week 4: Day in the Life, Software DeveloperWe’ve covered a lot of ground, but one area we haven’t hit on quite yet is the developer side of things. In today’s modern DevOps world, Read More
28 Oct 2020Cofense.News Purchase Order Phishing, the Everlasting Phishing TacticThe PDC team has seen a recent up-tick in legitimate Mimecast services being used as a vector for phishing campaigns found in environments Read More
27 Oct 2020News.Titus Budget-squeezed organizations face greater data security risksHow Titus and HelpSystems helps solve your data security needs Team Titus · Thursday, October 22nd, 2020 Organizations are more at risk Read More
27 Oct 2020Forcepoint.News Zero Trust Network Access (ZTNA): The cure for the common VPNVPNs and users don’t mix well That approach had been okay for small numbers of people working outside an office. But when everybody suddenly had Read More
27 Oct 2020BeyondTrust.News IT Security Leaders Share Scary Cybersecurity Tales & Cyberthreat Hobgoblins that Haunt their Sleep | BeyondTrustIT Security Leaders Share Scary Cybersecurity Tales & Cyberthreat Hobgoblins that Haunt their Sleep | BeyondTrust October 23, 2020 Open You Read More
27 Oct 2020News.Qualys NSA Alert: Chinese State-Sponsored Actors Exploit Known VulnerabilitiesOn October 20, 2020, the United States National Security Agency (NSA) released a cybersecurity advisory on Chinese state-sponsored malicious Read More
26 Oct 202026 Oct 2020News.RISK conference RISK 2020 letos v VIRTUALNI obliki!Spoštovani, vljudno vabljeni na največjo konferenco o informacijskim varnosti in novih tehnologijah v regiji Adriatik, RISK 2020, ki bo letos Read More
26 Oct 202026 Oct 2020News.RISK conference RISK 2020 this year in full VIRTUAL format!Dear, You are cordially invited to the largest conference on information security and new technologies in the Adriatic region, RISK 2020, which Read More
26 Oct 2020McAfee.News Data-Centric Security for the Cloud, Zero Trust or Advanced Adaptive Trust?Today, most entities utilize a multi-phased security approach. Most commonly, the foundation (or first step) in the approach is to implement Read More
25 Oct 2020Gartner.News.Press releases.ThreatQuotient Do Your Part to Stay Safe Online and Start Using a Password ManagerDo Your Part to Stay Safe Online and Start Using a Password Manager Aaron Louks Cybersecurity Awareness Month 2020 is about taking proactive Read More
25 Oct 2020FireEye.News Flare-On 7 Challenge SolutionsWe are thrilled to announce the conclusion of the seventh annual Flare-On challenge. This year proved to be the most difficult challenge we’ve Read More
24 Oct 2020Forcepoint.News Everything You Need to Know About the Cyber Voices Zero Trust SummitIf you’re a security leader for your organization, chances are good you’re at some point along a digital transformation journey that’s focused on Read More
24 Oct 2020News.Opentext OpenText World 2020—Are You Ready for the Great Rethink?The world is not changing. It has changed. These changes are deep. Structural. Lasting. We must use this opportunity to rethink on a massive Read More
23 Oct 2020FireEye.News Threats Targeting VoIP Networks as Usage Surges During PandemicInternet service providers are seeing a spike in Voice over Internet Protocol (VoIP) usage driven by the increased adoption of working from home Read More
23 Oct 2020Micro Focus.News INSPIRE 20 – mark my words! The importance of diverse tech innovationUKBlackTech All I can say about this week’s episode is WOW, Mark Martin, what an episode! Mark, a computer science teacher and founder of Read More
22 Oct 2020Carbon Black.News Crossing the Narrow SeaTom Kellermann, Head of Cybersecurity Strategy at VMware and Member of the Cyber Investigations Advisory Board of the United States Secret Read More
22 Oct 2020McAfee.News The Deepfakes Lab: Detecting & Defending Against Deepfakes with Advanced AIDeepfakes began to gain attention when a fake pornography video featuring a “Wonder Woman” actress was released on Reddit in late Read More
21 Oct 2020FireEye.News The Inception of Mandiant AdvantageOur customers expressed a desire for faster access to our intelligence to focus on threat activity that matters to them, so we launched Mandiant Read More
21 Oct 2020Checkmarx.News Cybersecurity Awareness Month Week 3: Day in the Life, AppSec EducatorIn the security industry, enough can’t be said about the need for spreading awareness. It’s the first, and most critical, step in spurring action Read More
21 Oct 2020Cofense.News Mandatory Internal Company Communications: The Best Time to PhishCompanies are awash with numerous corporate communications: open enrollment notifications, new policies and so forth. With this crush of Read More
20 Oct 2020BeyondTrust.News Understanding Authentication vs. Authorization | BeyondTrustUnderstanding Authentication vs. Authorization | BeyondTrust October 19, 2020 Open You May Also Be Interested In: Our website uses cookies to Read More
20 Oct 2020News.Qualys Qualys Policy Compliance Plugin for Jenkins Now AvailableVarious factors may introduce vulnerabilities in a product during its lifecycle, resulting in a drift from the required compliance status. Hence, Read More
19 Oct 2020NAKIVO.News Common Office 365 Issues and How to Solve ThemNAKIVO Blog > Office 365 Administration and Deployment > Common Office 365 Issues and How to Solve Them October 19, 2020 by Michael Bose Read More
19 Oct 2020News.ThreatMark Product Release 3.27 – Improved Bot detection, introduction to async large batch payments scoring, and the new ThreatMark AFS PanelThere’s been a lot of great work done by our team that just gets confined to our own company. Until now, we haven’t communicated out product Read More
19 Oct 2020Certgate Blurtooth Security Issue? AirID is safe!Blurtooth security vulnerability? AirID is safe – Blurtooth has no chance with AirID. Düsseldorf, 21.09.2020, certgate, one of Read More
18 Oct 2020News.ThreatQuotient Is Scaling a Pyramid on Your Bucket List? It Should BeThe concept of “The Pyramid of Pain” was first introduced by David J. Bianco in 2013. Today, most security professionals are familiar Read More
18 Oct 2020FireEye.News Windows Event Streaming Using FireEye Endpoint and HelixGathering Microsoft Windows event logs is a critical function of most SOCs. The wealth of information available on endpoints makes ingesting logs Read More
18 Oct 2020News.Versasec Versasec expands Windows Hello for BusinessDate: 2020-10-12Author: Anders Adolfsson, Versasec Technical Consultant Previous << VISA 1FA EMV In Microsoft Windows 10, Windows Hello for Read More
18 Oct 2020News.Riverbed Enabling Work-From-Anywhere | Application and Network Performance | RiverbedIn Part 1 and Part 2 of this blog series, we established that forward-thinking organizations are prioritizing technology investments to ensure Read More
17 Oct 2020Forcepoint.Gartner.News Future Insights – The Emergence of the Zoom of CybersecurityThis is the status quo today: We have all moved to remote working. Cloud deployment is a necessity. Digital transformation has happened—and where Read More
17 Oct 2020Indeed Identity.News Webinar: 5 coolest features every access management software should haveWhat if you’ve had one tool for managing access of employees and customers? Or a tool providing strong and multi-factor authentication with Read More
17 Oct 2020News.Opentext A little knowledge is a dangerous thing…In today’s world, everything moves so fast. Everyone wants something yesterday. Everyone demands and expects more from Read More
16 Oct 2020FireEye.News FIN11: Widespread Email Campaigns as Precursor for Ransomware and Data TheftMandiant Threat Intelligence recently promoted a threat cluster to a named FIN (or financially motivated) threat group for the first time since Read More
15 Oct 2020Carbon Black.News Ransomware Attacks Targeting Healthcare Surge: VMware Carbon Black experts Weigh inTargeted, sophisticated, and costly – over the past month, several high-profile ransomware attacks have been reported with a specific focus Read More
15 Oct 2020McAfee.News.Webinars “Best of Breed” – CASB/DLP and Rights Management Come TogetherEnter the cloud Most organizations now consider cloud services to be essential in their business. Services like Microsoft 365 (Sharepoint, Read More
14 Oct 2020FireEye.News Threat Found: Integrating With FireEye Detection On DemandThreats can and do come from everywhere, and every organization approaches security differently based on their needs, industry and environment. Read More
14 Oct 2020Checkmarx.News Cybersecurity Awareness Month Week 1: Day in the Life, Security ResearcherHave you ever wondered what a typical day looks like for a security researcher? If so, you’ve come to the right place! We’re kicking things off Read More
14 Oct 2020Cofense.News Security Awareness: Choosing Methods and Content that WorkLast week we examined the importance of setting a strategy and goals for your security awareness program. Part 2 in our 4-part series in support Read More
13 Oct 2020Forcepoint.News Shifting Gears from IOCs to IOBsThe after-the-fact nature of IOCs is one of their clearest limitations. They are documentation artifacts (hash of a file, reputation of an IP, Read More
13 Oct 2020BeyondTrust.News BeyondTrust Expands Cloud Leadership with Password Safe SaaS | BeyondTrustBeyondTrust Expands Cloud Leadership with Password Safe SaaS | BeyondTrust Join Us for Go Beyond – Our Virtual Customer Conference October Read More
12 Oct 2020NAKIVO.News How to Migrate from G Suite to Office 365 and Why You Need ItNAKIVO Blog > Office 365 Administration and Deployment > How to Migrate from G Suite to Office 365 and Why You Need It October 8, 2020 by Read More
11 Oct 2020Gartner.News.Press releases.ThreatQuotient ThreatQuotient Listed in Gartner’s 2020 Market Guide for Security Orchestration, Automation and Response SolutionsThreatQ platform’s data-driven approach to SOAR can free-up two to three full-time security analysts for higher level tasks Reston Va. Read More
11 Oct 2020FireEye.News Mandiant Executive Intelligence Briefing: Election Security EditionWith less than a month before the U.S. elections on Nov. 3, the race is on to protect the democratic process. Mandiant Threat Intelligence is Read More
11 Oct 2020Ivanti.News Coffee Talk With Ivanti Insiders on International Coffee DayName What is your favorite coffee drink? How do you take your coffee? What is your favorite fall/winter coffee drink? Favorite snack to have with Read More
10 Oct 2020Forcepoint.News Five Takeaways to Build a Resilient Cybersecurity Strategy1. Enable remote classified access With people as the new perimeter, cross domain solutions provide remote classified access, while Zero Trust Read More
10 Oct 2020News.Opentext Forrester: What to look for in cloud content management vendors This blog is co-authored by Alison Clarke and Sandi Nelson. Having the right partners by your side is crucial as your organization digitally Read More
9 Oct 2020FireEye.News Gartner: 5 Things You Must Absolutely Get Right for Secure IaaS and PaaSEvery organization is adopting the cloud in one way or another, and for good reason. The cloud offers many benefits, but it also comes with a new Read More
9 Oct 2020Micro Focus.News INSPIRE 20 – the secret diary of a security event crasher….Hacky-sec It’s time for one of my favorite days of the week – INSPIRE 20 podcast day! Today we are joined by the exceptional Tanya Janca, aka Read More
8 Oct 2020Carbon Black.News.Webinars Cybersecurity Awareness Month 2020: Top Resources on “If You Connect it, Protect it”Leaves are turning red and gold, the temperature is dropping, and the smell of pumpkin spice is filling the air. It’s officially October! Read More
8 Oct 2020McAfee.News MITRE ATT&CK for Cloud: Adoption and Value Study by UC Berkeley CLTCBackground Nearly all enterprises and public sector customers we work with have enabled cloud use in their organization, with many seeing a Read More
7 Oct 2020FireEye.News Introducing Mandiant Advantage: Threat Intelligence — Know the Threats That Matter Most To YouWhen it comes to cyber security, many organizations remain reactive. Cyber security becomes a top priority only when a breach occurs, or critical Read More
7 Oct 2020Checkmarx.News Expert Q&A on Securing Code in GitHub with CheckmarxWe sat down with Ken McDonald, Principal Integrations Engineer at Checkmarx, to learn more about how Checkmarx’s new GitHub Action works and how Read More
7 Oct 2020Armis.News 5 Questions CISOs Must Ask When Addressing the New WFH RealityIf you’re like me, your professional life has changed dramatically over the last six months and you’re likely working from home every day. Read More
7 Oct 20207 Oct 2020Armis.News Armis Recognized as a Leader in Connected Medical Device Security EvaluationWe are ecstatic that Armis has been named a Leader in The Forrester New Wave™: Connected Medical Device Security Q2 2020 report. Forrester Read More
7 Oct 2020Cofense.News Twelve Flavors of Phish: Canadian Workers Targeted With Fake Covid-19 Relief DepositsFinancial aid programs continue to be popular targets in the midst of the COVID-19 pandemic, with government relief grants a Read More
6 Oct 2020Forcepoint.Gartner.News Actionable Insights: The Disruption of Behavioral AnalyticsThe Broken Promise of Behavioral Analytics Dynamic User Protection IOB Overview Applied behavioral analytics have fallen short in terms of Read More
6 Oct 2020BeyondTrust.News Why Privilege Management is at the Center of Modern Endpoint Security | BeyondTrust3. Use Pragmatic Application Control & Block Malicious Code [Endpoint Privilege Management] By layering modern application control on top of Read More
6 Oct 2020News.Qualys Instrument VMware Virtual Machines for Security and ComplianceHow do you ensure Qualys is managing the security and compliance of all your VMware workloads? First, you need to have Qualys Cloud Agent Read More
5 Oct 2020NAKIVO.News How to Back Up OneDrive for Business with NAKIVO Backup & ReplicationNAKIVO Blog > Office 365 Administration and Deployment > How to Back Up OneDrive for Business with NAKIVO Backup & Replication Read More
5 Oct 2020McAfee.News McAfee Leapfrogs Competition with trio of awards at 2020 IT World AwardsThe IT World Awards are industry and peer recognitions from Network Products Guide honoring achievements of world’s best in organizational Read More
4 Oct 2020LOGbinder.News Today we revolutionize using Windows Event Collection at scaleWhat we are announcing today with Supercharger for Windows Event Collection reminds me of how far technology has come. I remember being so Read More
4 Oct 2020News.Press releases.ThreatQuotient.Webinars 5 Tips You Can Start Using Today to Reduce Business Risk5 Tips You Can Start Using Today to Reduce Business Risk POSTED BY ANDY GEPERT Cyber threat intelligence (CTI), risk management and privacy teams Read More
4 Oct 2020FireEye.News Back to School: The Cyber Workforce in 2020The cyber skills shortage is a real problem. There just aren’t enough qualified people to adequately meet the cyber security needs of all Read More
3 Oct 2020Forcepoint.News Our Cyber Voices Zero Trust Summit is Just a Few Weeks AwayIf you’re a business leader, a security executive or a security team lead or practitioner, you’ll leave this half-day virtual summit with a Read More
3 Oct 2020News.Opentext Running a resilient EIM platformInformation is key for businesses to operate and succeed, making it imperative that the Enterprise Informant Management platforms they rely on Read More
3 Oct 2020Centrify.News How to Empower the “Sec” in DevSecOpsIn this blog, I’m going to talk about Privileged Access Management (PAM) for security in a modern DevOps world. A very frustrating topic for Read More
3 Oct 2020News.Riverbed Perfect Forward Secrecy (PFS) API and SSL/TLS Analysis | AppResponse 11.10 | RiverbedKeeping track of SSL and TLS security certificates is important. An expired certificate can erode trust in your organization in that customers Read More
2 Oct 2020FireEye.News Detecting Microsoft 365 and Azure Active Directory BackdoorsMandiant has seen an uptick in incidents involving Microsoft 365 (M365) and Azure Active Directory (Azure AD). Most of these incidents are the Read More
2 Oct 2020News.PROFITAP Monitoring Remote Sites with IOTAThe majority of the organizations today are highly distributed, with systems and data scattered across several locations. Whether it’s Read More
1 Oct 2020Carbon Black.News Intrinsic Security at VMworld 2020VMworld 2020 kicked off today and for the first time ever, hundreds of security experts took the virtual stage to unveil Read More
30 Sep 2020FireEye.News In Pursuit of a Gestalt Visualization: Merging MITRE ATT&CK® for Enterprise and ICS to Communicate Adversary BehaviorsUnderstanding the increasingly complex threats faced by industrial and critical infrastructure organizations is not a simple task. As Read More
30 Sep 202030 Sep 2020Netwrix.News Data Privacy Solutions: How to Choose the Right OneData privacy solutions are crucial for complying with privacy regulations and maintaining security. In the first nine months of 2019, there were Read More
30 Sep 2020Checkmarx.News Remarkable University Study About Real-World Cybersecurity TrainingMost would agree that the best way to train someone is while they’re doing the activity themselves. For example, if someone wanted to train for a Read More
30 Sep 2020Cofense.News You Can Respond to Phishing Threats in Seconds with Cofense and Cyware: Here’s HowAll organizations will be phished, but they don’t have to experience a reputation-damaging breach. The best defense is a combination of aware Read More
29 Sep 2020Forcepoint.News.Webinars Webinar: CISO Strategy for the CloudThe cloud changes our approach to cybersecurity on so many levels—it introduces new technologies and technical complexities, presents us with a Read More
29 Sep 2020BeyondTrust.News Protecting Against PowerShell Attacks: 5 Key Steps | BeyondTrustProtecting Against PowerShell Attacks: 5 Key Steps | BeyondTrust September 23, 2020 Open You May Also Be Interested In: Our website uses cookies Read More
29 Sep 2020News.Qualys PAN-OS Critical Buffer Overflow Vulnerability (CVE-2020-2040) – Automatically Discover, Prioritize and Remediate Using Qualys VMDR®On Sept 9, 2020, Palo Alto Networks published nine security bulletins addressing vulnerabilities in PAN-OS operating system versions 8.0 or Read More
28 Sep 2020NAKIVO.News How to Configure an Out of Office Notification in Office 365NAKIVO Blog > NAKIVO Backup & Replication > How to Configure an Out of Office Notification in Office 365 September 25, 2020 by Michael Read More
27 Sep 2020News.Press releases.ThreatQuotient ThreatQuotient Celebrates World Rhino Day 2020 With Ongoing Support for Helping RhinosCybersecurity startup’s rhino conservation efforts have expanded to include three additional rhino adoptions and a Black Mamba sponsorship Read More
27 Sep 2020FireEye.News Ransomware and Observations from Recent IR InvestigationsRansomware continues to be one of the most significant cyber security issues affecting organizations today. The attack is very effective and can Read More
26 Sep 2020Forcepoint.News Government Organizations Must Rein in Privileged UsersIn surveying nearly 900 self-described privileged users—those who have higher-level access than your standard employee—in UK and US government, Read More
26 Sep 2020News.Opentext Getting the best performance from your Digital Asset Management systemPerformance is an essential component when implementing any solution and is critical for acceptance by the end users, administrators, consumers, Read More
25 Sep 2020FireEye.News Fuzzing Image Parsing in Windows, Part One: Color ProfilesImage parsing and rendering are basic features of any modern operating system (OS). Image parsing is an easily accessible attack surface, and a Read More
24 Sep 2020Carbon Black.News Detecting Threats in Real-time With Active C2 InformationOften security practitioners rely on the reputation of IP Addresses to determine if traffic to and from that IOC is malicious. In practice, the Read More
24 Sep 2020Backbox.News BackBox joins Cisco Security Technology Alliance (CSTA)BackBox joins Cisco Security Technology Alliance (CSTA) BackBox is excited to announce that it has joined the Cisco Security Technology Alliance Read More
24 Sep 2020McAfee.News MVISION Cloud for Microsoft TeamsWorking from home has become a new reality for many, as more and more companies are requesting that their staff work remotely. Already, we Read More
24 Sep 2020Allied Telesis.News Wi-Fi 6 – The Bare FactsThe latest wireless standard, 802.11ax (more commonly known as Wi-Fi 6), is about to be ratified by the IEEE and offers the potential for Read More
23 Sep 2020FireEye.News Uniting Security Superpowers: Mandiant Solutions and Microsoft Working Together for Better Security Outcomes“If everyone is moving forward together, then success takes care of itself.” — Henry Ford Regardless of industry, geography or Read More
23 Sep 2020Checkmarx.News Post-Pandemic Responsibilities for a Modern Day CISOAs organizations worldwide adjust to what’s being called the “new normal,” especially in the digital context, roles, and responsibilities of all Read More
23 Sep 2020Cofense.News Virtual Submerge is off to a roaring start.Here are a few quick highlights from day one. Judging from attendee feedback, it was a very good day one. And it’s not too late to join us for Read More
22 Sep 2020Forcepoint.News.Webinars Frost & Sullivan and Forcepoint Asia Pacific Risk & Cybersecurity SurveyFrost & Sullivan conducted a survey of 400 Asia Pacific (APAC) IT leaders in Australia, India, Singapore and Hong Kong to understand the Read More
22 Sep 2020BeyondTrust.News How a Major University is Securing Its Remote & On-Premise Workforces with Privilege Management | BeyondTrustHow a Major University is Securing Its Remote & On-Premise Workforces with Privilege Management | BeyondTrust September 21, 2020 Open You May Read More
22 Sep 2020News.Qualys Unified Dashboard for Enhanced Security VisualizationQualys has introduced a new app named Unified Dashboard (UD) to enrich your dashboarding experience. Unified Dashboard (UD) brings information Read More
21 Sep 2020NAKIVO.News NAKIVO Backup & Replication v10.1: What’s New?NAKIVO Blog > NAKIVO News > NAKIVO Backup & Replication v10.1: What’s New? September 21, 2020 by Grace Norman We’re excited to announce Read More
20 Sep 2020News.ThreatQuotient The Crucial Component of Detection and Response: Intelligence PivotingIntelligence Pivoting Allows You to Build a Broader Picture and is Pivotal to Detection and Response Pivot. It’s a word we’re hearing Read More
20 Sep 2020FireEye.News Ransomware Recon — Before the BreachNo one wants to see a repeat of last year’s string of ransomware attacks on municipalities where government services were offline for days, weeks Read More
19 Sep 2020News.Opentext Why small retailers are flocking to this EDI solutionWhy is Electronic Data Interchange (EDI) so important to small to medium sized businesses (SMBs) and why is it quickly becoming a necessity? Read More
18 Sep 2020FireEye.News APT41: A Dual Espionage and Cyber Crime OperationToday, FireEye Intelligence is releasing a comprehensive report detailing APT41, a prolific Chinese cyber threat group that carries out Read More
18 Sep 2020News.Riverbed Synthetic Application Monitoring | 5 Key Benefits of Synthetic Monitoring for Modern Applications | RiverbedBefore we get into the benefits of synthetic monitoring, let’s start by defining it. Synthetic monitoring is a method used to monitor Read More
18 Sep 2020News.Riverbed Synthetic Application Monitoring | 5 Key Benefits of Synthetic Monitoring for Modern Applications | RiverbedBefore we get into the benefits of synthetic monitoring, let’s start by defining it. Synthetic monitoring is a method used to monitor Read More
18 Sep 2020Micro Focus.News Software Audits During a PandemicThe letter of the law Virtually anyone who has worked in IT over a meaningful period of time has experienced a software audit, which is sometimes Read More
17 Sep 2020Carbon Black.News Top Three Demos at VMworld 2020: Security, Threat Hunting, and BeyondVMworld 2020 (Sept. 29- Oct. 1) is fast approaching. This year, and for the first time ever, VMworld will Read More
16 Sep 2020FireEye.News A “DFUR-ent” Perspective on Threat Modeling and Application Log Forensic AnalysisMany organizations operating in e-commerce, hospitality, healthcare, managed services, and other service industries rely on web applications. And Read More
16 Sep 2020Checkmarx.News Application Security: Turbulence Often Leads to TransformationThe COVID-19 pandemic is inescapably modifying working conditions, forcing unwanted budget cuts, altering the broad terrain of security Read More
16 Sep 2020Cofense.News Phish Fryday – Phishing FinanceWe use our own and third-party cookies to enhance your experience by showing you relevant content, personalizing our communications with you, and Read More
15 Sep 2020News.Titus Choosing a remote workforce protection solution: What the experts are sayingHome » Blog » Choosing a remote workforce protection solution: What the experts are saying Team Titus · Wednesday, September 9th, 2020 Read More
15 Sep 2020Forcepoint.News Join Us September 24 for our Government at the Edge 2020 Cybersecurity SummitAs an industry we are learning many important lessons as we plan for what cybersecurity should look like in this new era. Agencies need to plan Read More
15 Sep 2020BeyondTrust.News Which Windows Server Events Should You Monitor and Why? | BeyondTrustWhich Windows Server Events Should You Monitor and Why? | BeyondTrust September 9, 2020 Open You May Also Be Interested In: Our website uses Read More
15 Sep 2020News.Qualys September 2020 Patch Tuesday – 129 Vulnerabilities, 23 Critical, SharePoint, Exchange, Windows Codecs, Adobe VulnsThis month’s Microsoft Patch Tuesday addresses 129 vulnerabilities with 23 of them labeled as Critical. The 23 Critical vulnerabilities cover Read More
14 Sep 2020Micro Focus.News Micro Focus is A1 for Ease of Doing Business with…helping to rock the Net Promoter®How do we Measure easy to do business with? Micro Focus uses double-blind competitive benchmarking in order to gauge how well we are doing Read More
13 Sep 2020News.Press releases.ThreatQuotient.Webinars CTI Recommendations from a Panel of ExpertsCTI Recommendations from a Panel of Experts POSTED BY ANDY GEPERT In the last few years, Cyber Threat Intelligence (CTI) has matured into a Read More
13 Sep 2020News.Versasec VISA 1FA EMVDate: 2020-09-08Author: Martin Scholz, Versasec R&D Manager Previous << NIST ZTA Using strong authentication, two-factor authentication Read More
12 Sep 2020Forcepoint.News Forcepoint Engineer Plays Role in UK Study of Neurological Impact of COVID-19In June, we were able to present our findings from the first systematic, nationwide UK surveillance study of the breadth of acute complications Read More
12 Sep 2020News.Opentext How to select the best digital fax provider in 2020Fax has been the secure communications lifeblood of organizations across industries for decades, but the technology has evolved far beyond Read More
11 Sep 2020Ivanti.News What Is IT Asset Management?Even though ITAM has been around for a long time, there are still some very loose interpretations that claim to define IT asset management Read More
11 Sep 2020Micro Focus.News Who are the most innovative companies?New kids on the block or old-timers? People often think that hot new tech startups, with their promises to revolutionize ________ (fill in the Read More
10 Sep 2020Carbon Black.News The U.S. Secret Service Selects Tom Kellermann to Serve on Inaugural Cyber Investigations Advisory BoardCybersecurity has become a recurring global news headline. From ransomware to data breaches, cyberattacks continue to be one of the biggest Read More
9 Sep 2020Checkmarx.News On the Road to DevSecOps: Security and Privacy Controls per NIST SP 800-53In the context of software security, in section SA-11, DEVELOPER TESTING AND EVALUATION beginning on page 267, this control requires the Read More
9 Sep 2020Cofense.News Message Quarantine Campaign with Overlying PotentialWe use our own and third-party cookies to enhance your experience by showing you relevant content, personalizing our communications with you, and Read More
8 Sep 2020BeyondTrust.Gartner.News Gartner 2020 Magic Quadrant & Critical Capabilities Reports for Privileged Access Management | BeyondTrustGartner 2020 Magic Quadrant & Critical Capabilities Reports for Privileged Access Management | BeyondTrust September 4, 2020 Open You May Read More
8 Sep 2020News.Qualys Detect FritzFrog and Other Malware Infections with Inventory DataRecently, Guardicore researchers discovered a new type of malware called “FritzFrog,” which targets multiple industry verticals, including Read More
7 Sep 2020NAKIVO.News Account-Level Calendar and Contacts Sharing for Office 365NAKIVO Blog > NAKIVO Backup & Replication > Account-Level Calendar and Contacts Sharing for Office 365 September 3, 2020 by Michael Read More
7 Sep 2020McAfee.News What A Threat Analyst Really Thinks of IntelligenceWhen I was a threat analyst, too long ago for me to actually put in writing, I remember the thrill of discovery at the apex of the boredom of Read More
6 Sep 2020News.Press releases.ThreatQuotient Are You Maximizing MITRE ATT&CK? Insights from the new SANS Whitepaper Will HelpAre You Maximizing MITRE ATT&CK? Insights from the new SANS Whitepaper Will Help POSTED BY LIZ BUSH The MITRE ATT&CK framework has become Read More
5 Sep 2020Forcepoint.News Customer Outcomes and End-User Experience Matter More Than Raw Numbers for Cloud ServicesThe center of data gravity has shifted from company-operated centralized datacenters to SaaS applications and cloud workloads and this poses new Read More
5 Sep 2020News.Opentext Building resilient digital supply chains in Japanese auto and manufacturingFor decades, the Japanese automotive and manufacturing industries have been the envy of the world. They have exported production models that Read More
4 Sep 2020FireEye.News The Cost Factor: Taking a Proactive Approach to Cyber Security ROISecurity teams are doing their best to keep employees online and secure during this extended period of working from home, but as we move towards Read More
4 Sep 2020Micro Focus.News Micro Focus Virtual Universe On-DemandThat was then Earlier this year, it what seems like many months ago, we had the pleasure of hosting nearly 4000 of our customers in our annual Read More
3 Sep 2020Carbon Black.News XDR DefinedThe EDR market is going through the biggest period of change and innovation now. Historically, endpoint detection and response Read More
2 Sep 2020FireEye.News Under the Influence: A Look at Modern Day Information OperationsInformation operations (IO) gained prominent public attention in 2016 during the U.S. general election. Since then, new campaigns have continued Read More
2 Sep 2020News.PROFITAP How to Troubleshoot Intermittent Problems?When it comes to solving network problems, intermittent problems are some of the toughest to resolve. It can take weeks for only trying to catch Read More
2 Sep 2020Cofense.News Phish Fryday – RansomwareWe use our own and third-party cookies to enhance your experience by showing you relevant content, personalizing our communications with you, and Read More
1 Sep 2020News.Titus Ep.7: Vinayak Godse (DSCI) – Titus Talks Cybersecurity PodcastJason Hodgert · Wednesday, August 26th, 2020 Our guest is Vinayak Godse, Vice President of Data Security Council of India (DSCI). Jason Read More
1 Sep 2020BeyondTrust.News BeyondTrust CEO Matt Dircks Named Finalist in EY Entrepreneur Of The Year® 2020, Southeast | BeyondTrustBeyondTrust CEO Matt Dircks Named Finalist in EY Entrepreneur Of The Year® 2020, Southeast | BeyondTrust August 26, 2020 Open You May Also Be Read More
1 Sep 2020News.Qualys Meow Attack: A Reminder for Organizations to Identify and Secure Their DatabasesThousands of unsecured internet-facing databases have fallen prey to the “Meow” attack and have been permanently destroyed. Meow attacks replace Read More
31 Aug 2020McAfee.News.Webinars Why Ransomware Targets No Longer Need to Wind Up as Ransomware VictimsBut being a target doesn’t mean you’re fated to become a victim. With the deployment of complete and proactive security software, organizations Read More
30 Aug 2020News.ThreatQuotient Putting the Pieces Together for Extended Detection and ResponsePulling the Right Data From the Right Tools Allows You to Validate a Detection and Respond Effectively The Data Breach Investigations Report Read More
30 Aug 2020FireEye.News Policy Evasion: Evasive Techniques You Need to Understand to Prevent Breaches and AttacksEvasive techniques are regularly used by cyber attackers to avoid detection and hide malicious activity, and they are quite effective too. In Read More
30 Aug 2020News.Versasec NIST Special Publication on Zero Trust ArchitectureDate: 2020-08-27Author: Joakim Thorén, CEO Previous << vSECCMS S5.8 The US National Institute of Standards and Technology (NIST) has Read More
29 Aug 2020Forcepoint.News In Case of Emergency: Securing “Break-the-Glass” Access ProtocolsIt’s never been more important for workers who are feeling sick to stay home, so many hospitals have faced staffing shortages that threaten to Read More
29 Aug 2020News.Opentext How a global research and manufacturing company achieves regulatory complianceAs a Contract Research and Manufacturing organization with over 330 clients around the globe, regulatory compliance is non-negotiable for Syngene Read More
29 Aug 2020Centrify.News Centrify Delegated Machine Credentials – Modern IAM for Machines and ServicesCentrify was founded on the idea of centralizing identity and access management across the heterogeneous enterprise within Active Directory. More Read More
28 Aug 2020FireEye.News Emulation of Malicious Shellcode With SpeakeasyIn order to enable emulation of malware samples at scale, we have developed the Speakeasy emulation framework. Speakeasy aims to make it as easy Read More
28 Aug 2020Micro Focus.News Post-Sales Support – Done Right For A Rocking Net Promoter®How do we Measure Post-Sales Support? Micro Focus uses double-blind competitive benchmarking in order to gauge how well we are doing against the Read More
27 Aug 2020Carbon Black.News Top Three Things I’m Looking Forward to at VMworld 2020VMworld 2020 (September 29 to October 1) is right around the corner. This year’s event is entirely virtual and offers a unique way for all Read More
27 Aug 2020Gartner.McAfee.News McAfee ESM Named a 2020 Gartner Peer Insights Customers’ Choice for SIEMWe are most appreciative of our customers who support our solutions and share their opinions through forums like Gartner Peer Insights. The voice Read More
26 Aug 2020FireEye.News A Hands-On Introduction to Mandiant’s Approach to OT Red TeamingOperational technology (OT) asset owners have historically considered red teaming of OT and industrial control system (ICS) networks to be too Read More
26 Aug 2020Checkmarx.News Integrating Checkmarx Security Results within GitLabAnnounced today, we’re thrilled to share that CxSAST, CxSCA, and CxCodebashing all now integrate seamlessly within GitLab’s ecosystem via CxFlow: Read More
26 Aug 2020Cofense.News Humans and Machines – Phishing Mitigation Automation SOARing to New HeightsCofense and Palo Alto Networks Cortex XSOAR integrate to counter phishing threats that evade secure email gateways (SEGs). Human-verified Read More
25 Aug 2020News.Titus Why Zero Trust is so hot right now – and how Titus helps make it happenHome » Blog » Why Zero Trust is so hot right now – and how Titus helps make it happen Matthew McCormick · Monday, August 24th, 2020 If Read More
25 Aug 2020Forcepoint.News Today’s Cybersecurity Challenges Require Professionals Who Understand What They’re Protecting and WhyAll of this makes it more critical than ever that the cybersecurity warriors inside your company understand how your business operates in order Read More
25 Aug 2020BeyondTrust.News macOS Security: Managing Privileged Access & Credentials | BeyondTrustmacOS Security: Managing Privileged Access & Credentials | BeyondTrust August 24, 2020 Open You May Also Be Interested In: Our website uses Read More
25 Aug 2020News.Qualys Automated Discovery and Assessment of PaaS Databases with Lambda Service for Qualys Policy ComplianceIn the last several years, Platform as a Service (PaaS) solutions have evolved and matured. As organizations have focused on digital Read More
24 Aug 2020Gartner.McAfee.News The Economic Benefits from McAfee’s UCE SolutionThe cloud transformation that we are seeing today is happening across several dimensions. Companies are rapidly moving from their private data Read More
23 Aug 2020Gartner.News.Press releases.ThreatQuotient Spike in Cloud Attacks Shows Businesses were not Prepared to Work from HomeSpike in Cloud Attacks Shows Businesses were not Prepared to Work from Home POSTED BY RYAN TROST Businesses continue to place more and more data Read More
23 Aug 2020FireEye.News How Strategic Intelligence Helps Organizations Make Sense of the Threat LandscapeThe Strategic Analysis team at Mandiant Threat Intelligence examines hundreds of discrete data points from numerous sources, distilling trends Read More
22 Aug 2020Forcepoint.News.Webinars A New Way to Think About Breach DetectionData breaches can cripple businesses. While it’s true the financial implications tend to be significant—both in terms of revenue loss and Read More
22 Aug 2020News.Opentext Keeping up the fight on cancer during pandemicIn just a few months, COVID-19 changed the world. Millions have been infected and hundreds of thousands have died at the time of writing. This Read More
22 Aug 2020Centrify.News Combat Data Breaches, Weak Passwords, and Phishing Attacks with Multi-Factor AuthenticationForrester Research has estimated that 80 percent of security breaches involve weak, default, stolen, or otherwise compromised privileged Read More
21 Aug 2020FireEye.News The FireEye Approach to Effective Cloud SecurityReports indicate that roughly 83% of workloads are in the cloud as of this year. That’s a lot of new real estate for attackers, and now is the Read More
21 Aug 2020Micro Focus.News INSPIRE 20 – Summer BreakWith five outstanding INSPIRE 20 podcasts under our belt, our team is taking a few weeks break to relax, refresh, and build up some more exciting Read More
20 Aug 2020Carbon Black.News Top Six VMworld 2020 Sessions and Activities for a Threat HunterI’m excited to be a part of VMworld 2020 as a speaker and as a member of VMware Carbon Black. This year at VMworld 2020, Read More
19 Aug 2020FireEye.News How Secure Is Your Remote Work Infrastructure?Most organizations couldn’t even conceive a completely remote workforce, but earlier this year the world experienced an unpredictable Read More
19 Aug 2020Checkmarx.News You Better Get Going with GoWell, this is basically my story too. I left Node.js as well, and now I use the Go Language (Golang, Go) as my backend technology of choice. Read More
19 Aug 2020Certgate AirID2 – the world’s first smartcard reader with Bluetooth 5 supportAirID is future proof – Bluetooth 5 will enable new possibilities. Düsseldorf, August, 10th, 2020 – certgate, one of the Read More
19 Aug 2020Cofense.News Phish Fryday – Phishing Defense ExpertiseSHARES ShareTweet Identifying a phishing email is more than a yes/no, good/bad equation. If it’s bad, you need to know how bad it is. If my user Read More
18 Aug 2020Forcepoint.News The New Normal for Cloud ArchitectureThe vast majority of customers I talk to are accelerating their digital transformation efforts. Beyond relying more on cloud applications, this Read More
18 Aug 2020BeyondTrust.News How Secure is your School for Virtual Learning this Fall? | BeyondTrustHow Secure is your School for Virtual Learning this Fall? | BeyondTrust August 17, 2020 Open You May Also Be Interested In: Our website uses Read More
18 Aug 2020News.Qualys August 2020 Patch Tuesday – 120 Vulnerabilities, 17 Critical, Media Foundation, Windows Codecs, Workstation, AdobeThis month’s Microsoft Patch Tuesday addresses 120 vulnerabilities with 17 of them labeled as Critical. The 17 Critical vulnerabilities cover Read More
18 Aug 2020News.Riverbed SteelConnect EX SD-WAN Enterprise Data Center IntegrationWe continue our learning journey on SteelConnect EX, Riverbed’s Enterprise SD-WAN offering. This time, we are going to address one of the hottest Read More
16 Aug 2020Gartner.News.Press releases.ThreatQuotient Evaluating Threat Intelligence Solutions? Download the New Gartner Market GuideEvaluating Threat Intelligence Solutions? Download the New Gartner Market Guide POSTED BY LIZ BUSH The surge in the number of remote workers, Read More
16 Aug 2020FireEye.News An Anatomy of a Public Cloud CompromiseIn many ways, the public cloud is more secure than a traditional data center. And yet, assets on the public cloud are compromised all the same. Read More
15 Aug 2020Forcepoint.News Forcepoint NGFW and Azure Virtual WAN Integration Now AvailableAzure Virtual WAN Forcepoint NGFW and Azure Virtual WAN Integration Guide Forcepoint NGFW Azure Virtual WAN is a networking service that brings Read More
15 Aug 2020News.Opentext Corporate Citizenship in 2020: Our Opportunity to Be MoreIn 2020, corporate citizenship has never been more important, or more meaningful. At OpenText, we believe that information has the power to Read More
14 Aug 2020FireEye.News Calling All Hunters: FireEye Announces Bug Bounty ProgramAs security researchers and front-line defenders, we at FireEye understand the importance of investigating and responding to security issues. We Read More
13 Aug 2020Carbon Black.News The Future of Security: Lessons from Black Hat USAFor the last 23 years, Black Hat has been the world’s leading information security event where attendees are able to experience the latest Read More
13 Aug 2020McAfee.News How We’re Using AI to Usher in the Era of the “Smarter SOC”Businesses are having to deal with two crises simultaneously—the impact of a global recession and the acceleration of malicious cyber activity. Read More
12 Aug 2020FireEye.News COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker ModuleDuring a recent investigation at a telecommunications company led by Mandiant Managed Defense, our team was tasked with rapidly identifying Read More
12 Aug 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week Ending August 2, 2020Cofense solutions enable organizations to identify, analyze, and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More
11 Aug 2020News.Titus Ep.6: Cem Uçtum – Titus Talks Cybersecurity PodcastJason Hodgert · Tuesday, August 11th, 2020 In this episode, Jason brings Sebastien Roques back to have a discussion with Cem Uçtum, from Read More
11 Aug 2020Forcepoint.News Safeguarding Your Organization Through Proactive Conduct Risk ManagementThe risk that FSI institutions and their employees will negatively harm customers or negatively impact financial market integrity The risk of Read More
11 Aug 2020BeyondTrust.News The WFH Cybersecurity & Business Continuity Lessons of Covid-19 | BeyondTrustThe WFH Cybersecurity & Business Continuity Lessons of Covid-19 | BeyondTrust August 10, 2020 Open You May Also Be Interested In: Our website Read More
11 Aug 2020Ivanti.News Workspace Control Now With Ivanti Neurons for Edge IntelligenceFollowing the formation of the Independent Business Unit earlier this year, we’ve been refocusing our attention on Ivanti Workspace Read More
11 Aug 2020News.Qualys Continuous Monitoring and BeyondAs security professionals, we struggle with the high volume of data we need to sort through while trying to parse out the critical alerts that Read More
10 Aug 2020NAKIVO.News Microsoft Office 365 Data Safety: A Full Overview of the Shared Responsibility ModelNAKIVO Blog > Office 365 Administration and Deployment > Microsoft Office 365 Data Safety: A Full Overview of the Shared Responsibility Read More
9 Aug 2020News.ThreatQuotient The contradiction of post COVID-19 risk managementSecurity vs. usability is always a constant struggle for security teams. The rapid change to remote access during the pandemic has forced Read More
9 Aug 2020FireEye.News Intelligently Test Your Security Program Against MITRE ATT&CK FrameworkFor most organizations, implementing MITRE ATT&CK™ as part of a security program is a difficult task. Many lack the necessary Read More
8 Aug 2020Forcepoint.News Believe What I Do, Not What I Say – Understanding User Security Habits with Behavioral AnalyticsWhy is this the case? While this scenario describes less than ideal training materials and processes (a topic worthy of its own blog post), it Read More
8 Aug 2020News.Opentext The customer experience is now digitalCustomer experience has increasingly been focused on digital for several years, but the events of 2020 have drastically accelerated that change. Read More
7 Aug 2020FireEye.News Bypassing MassLogger Anti-Analysis — a Man-in-the-Middle ApproachThe FireEye Front Line Applied Research & Expertise (FLARE) Team attempts to always stay on top of the most current and emerging threats. As Read More
7 Aug 2020Micro Focus.News A lesson from Wonder Woman and the Power of CollaborationWe are a quarter of the way into our INSPIRE 20 podcast journey, and I’m pleased to bring you… View Article (Feed generated with Read More
6 Aug 2020Carbon Black.News Black Hat USA 2020: VMware Carbon Black Releases Global Incident Response Threat Report Detailing Surge in Cyberattacks Amid COVID-19At Black Hat USA this week, VMware Carbon Black unveils findings from the fifth installment of the semiannual Global Incident Response Threat Read More
6 Aug 2020McAfee.News Source Code Leak – What We Learned and How You Can Protect Your IPThe latest leak appears to stem primarily from a misconfiguration of SonarQube, an open-source tool for static code analysis, which Read More
5 Aug 2020FireEye.News Announcing the Seventh Annual Flare-On ChallengeThe FireEye Labs Advanced Reverse Engineering (FLARE) team is honored to announce that the popular Flare-On challenge will return for a Read More
5 Aug 2020Checkmarx.News Privilege Escalation on Meetup.com Enabled Redirection of PaymentsAs a result of our investigations, which are further detailed in this technical report, we found several “more-common” API security issues like Read More
5 Aug 2020Cofense.News Cofense Expands SOAR Integration Partners to Accelerate Phishing Incident ResponseLEESBURG, Va., Aug. 3, 2020 – Cofense®, the global leader in intelligent phishing defense solutions, today announced enhanced phishing analysis Read More
4 Aug 2020BeyondTrust.News Reduce Service Tickets & Unburden the Help Desk by Removing Endpoint Admin Rights | BeyondTrustReduce Service Tickets & Unburden the Help Desk by Removing Endpoint Admin Rights | BeyondTrust July 31, 2020 Open You May Also Be Interested Read More
4 Aug 20204 Aug 2020McAfee.Webinars NO PAIN, NO GAIN – McAfee Q3 Technical WebinarsAre you a McAfee Partner and working with McAfee in a technical role? Then these McAfee EMEA Channel Tech Sessions are for you. Does your job Read More
4 Aug 2020News.Qualys GRUB2 Boothole Buffer Overflow Vulnerability (CVE-2020-10713) – Automatically Discover, Prioritize and Remediate Using Qualys VMDR®On July 29, 2020, Eclypsium researchers disclosed a high-risk vulnerability in GRUB2 (GRand Unified Bootloader version 2) affecting billions of Read More
3 Aug 2020NAKIVO.News A Guide to VMware vSphere 7.0 Installation and SetupNAKIVO Blog > NAKIVO Backup & Replication > A Guide to VMware vSphere 7.0 Installation and Setup August 3, 2020 by Michael Bose VMware Read More
3 Aug 2020News.Riverbed SD-WAN or WAN Optimization? | RiverbedSD-WAN or WAN Optimization? I love that question. And, in order to answer it correctly, let me first dispel a common misperception. The question Read More
2 Aug 2020News.Press releases.ThreatQuotient How Airbus CyberSecurity is Scaling and Enriching Threat Intelligence with ThreatQHow Airbus CyberSecurity is Scaling and Enriching Threat Intelligence with ThreatQ POSTED BY LIZ BUSH Mention the name “Airbus” and Read More
2 Aug 2020FireEye.News Protecting Election Integrity With the Power of Hive-IQWith local, state, and national elections fast approaching, the cyber security stakes are high. Citizens’ personal data and actual votes are Read More
2 Aug 2020News.PROFITAP Advanced Network Packet Broker Features ExplainedIn today’s modern network architecture, monitoring and security tools are required to handle traffic coming from multiple visibility Read More
1 Aug 2020Forcepoint.News Celebrating Security Leaders: 100 Global CISOs for 2020That’s why we’re excited to be part of the 2020 Global CISO100—We see it as a way to shine a light on security heroes and visionaries of today Read More
1 Aug 2020News.Opentext Partnering to deliver accessible contentReviewing a bank statement, checking an electricity bill, or even reading a restaurant menu — simple, everyday actions that most people Read More
1 Aug 2020Centrify.News Securing DevOps with Centrify Delegated Machine CredentialsAt its core, DevOps focuses on delivering faster time to market with more reliability and efficiency through a cycle of rapid, continuous Read More
31 Jul 2020FireEye.News Obscured by Clouds: Insights into Office 365 Attacks and How Mandiant Managed Defense InvestigatesWith Business Email Compromises (BECs) showing no signs of slowing down, it is becoming increasingly important for security analysts to Read More
31 Jul 2020Indeed Identity.News Indeed Identity and vMind join forces to provide best solutions for Turkish marketWe are happy to announce our first exclusive distribution agreement in the EMEA region signed with vMind, the leading IT distribution company in Read More
31 Jul 2020Micro Focus.News The Net Promoter® Education DifferenceThe Education Difference Education. This is not normally a touchpoint along the customer journey that most people think of… View Read More
30 Jul 2020Carbon Black.Gartner.News Carbon Black EDR’s All-New Live Query Capability and Enhanced Fileless VisibilityVMware Carbon Black is excited to announce that VMware Carbon Black EDR (formerly CB Response), recently named by Gartner as a 2020 Read More
30 Jul 2020McAfee.News Introducing MITRE ATT&CK in MVISION Cloud: Defend with PrecisionMost enterprises use over 1,500 cloud services, generating millions of events, from login, to file share, to download and an infinite number of Read More
29 Jul 2020FireEye.News ‘Ghostwriter’ Influence Campaign: Unknown Actors Leverage Website Compromises and Fabricated Content to Push Narratives Aligned With Russian Security InterestsMandiant Threat Intelligence has tied together several information operations that we assess with moderate confidence comprise part of a broader Read More
29 Jul 2020Checkmarx.News On the Road to DevSecOps: Securing the Software Driving MobilityHowever, the increasing number of applications and software-driven components are also associated with an increase in software-related risks. Read More
29 Jul 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week Ending July 19, 2020Cofense solutions enable organizations to identify, analyze, and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More
28 Jul 2020News.Titus Ep. 5: Paul Starrett – Titus Talks Cybersecurity PodcastPrivacy: What does it mean and how do we achieve it? Jason Hodgert · Monday, July 27th, 2020 This is just part of the fast-paced Read More
28 Jul 2020Forcepoint.News More Is Not Merrier: Point Products Are DeadOrganizations using more than 50 tools to manage their security environment and respond to incidents ranked 8% lower in their ability to detect Read More
28 Jul 2020BeyondTrust.News Remote Access, Cloud Adoption, & Digital Transformation are Accelerating: PAM Secures & Enables It | BeyondTrustRemote Access, Cloud Adoption, & Digital Transformation are Accelerating: PAM Secures & Enables It | BeyondTrust July 23, 2020 Open You Read More
27 Jul 2020NAKIVO.News NAKIVO Backup & Replication v10 Now Supports VMware vSphere 7NAKIVO Blog > NAKIVO Backup & Replication > NAKIVO Backup & Replication v10 Now Supports VMware vSphere 7 July 23, 2020 by Grace Read More
27 Jul 2020McAfee.News The Schrems II Decision: The Day AfterThe European Court of Justice (“CJEU”) yesterday invalidated the Privacy Shield, an agreement between the European data regulators and the U.S. Read More
26 Jul 2020News.Niagara Networks L7 Defense and Niagara Networks Close the API Security GapWritten by Zeev Draer VP of Marketing Niagara Networks and Ilan Paretsky CMO L7 Defence If there’s one need more critical than others Read More
26 Jul 2020News.ThreatQuotient Emerging Threats During Times of Crisis: Insights from Airbus Cybersecurity’s Phil JonesThe global pandemic has highlighted the importance of being prepared for the unexpected. Opportunistic attackers are taking advantage of rapidly Read More
25 Jul 2020Forcepoint.News Shining the Light on Forcepoint Advanced Classification Engine (ACE)The creation and evolution of ACE by the Forcepoint X-Labs team started more than a decade ago. This tried and trusted technology protects you, Read More
25 Jul 2020News.Opentext Resilience and innovation in the face of insecuritySwitch knows data. As a world leader in data center ecosystems with 100% uptime, the Las Vegas company powers connection and safeguards data for Read More
25 Jul 2020Centrify.News Centrify Extends Industry-Leading PAM Deployment Options with Hyper-Scalable Privileged Access ServiceIn the 20.3 product release for Centrify Privileged Access Service (PAS), we unveiled a new architecture offering that allows hyper-scalable Read More
24 Jul 2020FireEye.News FireEye – A Partner to the State, Local Government and Education SectorsIn previous blog posts, I spent a good deal of time focusing on the threat landscape facing State, Local Government and Education systems. Read More
24 Jul 2020Micro Focus.News Lending Privilege – how can we do more to lift one another up and create a more inclusive workplace?The story continues Our INSPIRE podcast journey just keeps on getting better. Hot on the heels of our podcast with June Manley, founder of F4, I Read More
23 Jul 2020Allied Telesis.News A Quick Guide to Industrial EthernetWhat is Industrial Ethernet? Industrial Ethernet refers to the use of networking devices, usually switches, in harsh environments. Ethernet is Read More
22 Jul 2020FireEye.News Unique Threats to Operational Technology and Cyber Physical SystemsIn this latest episode of our Eye on Security podcast, I talk all about the world of operational technology (OT) and cyber physical systems with Read More
22 Jul 2020Checkmarx.News On the Road to DevSecOps: Top Three Benefits of CxFlowPertaining to development tools, DevOps is also about automation of the different tooling in use that improves the speed of software delivery. Read More
22 Jul 2020Cofense.News Phish Fryday – Q2 2020 Phishing ReviewLearn more: Share: As phishing attacks remain a top threat to organizations across the globe, it’s critical to understand just what tactics and Read More
21 Jul 2020News.Titus Updated Titus Methodology in three phasesScott Hubert · Thursday, July 16th, 2020 It was around 2013 when we began to realize that while data classification is a technology Read More
21 Jul 2020Forcepoint.News.Webinars Top 10 Cybersecurity Trends Due to COVID-19Here’s a taste of my Top 10 Cybersecurity Trends list (for the full experience, click the Watch the Webcast button on the right). Overall, the Read More
21 Jul 2020News.Qualys Automatically Discover, Prioritize and Remediate Windows DNS Vulnerability (CVE-2020-1350) Using Qualys VMDR®On July 14, 2020, Microsoft issued a new security advisory on Microsoft Windows Patch Day – addressing CVE-2020-1350, also known as SigRed – a Read More
20 Jul 2020NAKIVO.News VMware vSphere 7 Released: What’s New?NAKIVO Blog > Data Protection > Backup Technologies > VMware vSphere 7 Released: What’s New? July 16, 2020 by Michael Bose VMware Read More
20 Jul 2020McAfee.News Create Strong Passwords with a Password GeneratorTo effectively protect your accounts from being hacked, it’s important that you have a strong password with each account that you create. Read More
19 Jul 2020FireEye.News 9.0 Release for the Network Security Product PortfolioFireEye is excited to announce the release of version 9.0 for our Network Security product portfolio that includes Network Security (NX), Central Read More
18 Jul 2020News.Opentext How information governance helps reduce IT budgetsA volatile economy and massive disruptions to business models have many IT planners scrambling to allocate budget and keep up with the changes. Read More
18 Jul 2020News.Riverbed Future of Work Survey 2020 | How Companies are Planning for ‘Work from Anywhere’ | RiverbedAs the “new normal” becomes just normal, companies are preparing for a large-scale, long-term shift to remote work, where increasingly employees Read More
17 Jul 2020FireEye.News capa: Automatically Identify Malware Capabilitiescapa is the FLARE team’s newest open-source tool for analyzing malicious programs. Our tool provides a framework for the community to encode, Read More
17 Jul 2020Indeed Identity.News New Indeed CM 6.2 release shapes the future of PKIWe have added a number of new functionalities to the Indeed CM software since the last release. The brand new features include the introduction Read More
16 Jul 2020Carbon Black.News Tax Day Fraud: “Identity Theft Subscriptions” in High Demand on the Dark WebWith billions of stolen usernames, passwords, banking information and more circulating on the dark web, identity theft is an evolving and Read More
15 Jul 2020FireEye.News SCANdalous! (External Detection Using Network Scan Data and Automation)Real Quick In case you’re thrown by that fantastic title, our lawyers made us change the name of this project so we wouldn’t get sued. Read More
15 Jul 2020Checkmarx.News Mutation Cross-Site Scripting (mXSS) Vulnerabilities Discovered in Mozilla-BleachAccording to documentation, “Bleach is an allowed-list-based HTML sanitizing library that escapes or strips markup and attributes and is intended Read More
15 Jul 2020Cofense.News Practitioners Report the Need for Layered Email SecurityIn a recent survey, a majority of practitioners agreed on the need for protection that augments email gateways to deal with phishing attacks. By: Read More
15 Jul 2020Cofense.News HMRC latest target in global COVID relief phishing campaignsTaxes and rebates have long been some of a phisher’s favorite targets. Now the coronavirus has provided a fresh new way to exploit this topic: Read More
14 Jul 2020News.Titus Ep.4: Neil Thacker – Titus Talks Cybersecurity PodcastJason Hodgert · Thursday, July 9th, 2020 In this episode, the podcast goes overseas to get a global perspective on data security from Read More
14 Jul 202014 Jul 2020McAfee.News.ThreatQuotient Join us at “The Evolution of Threat Intelligence” RoundtableWednesday, July 22nd at 4:00 PM CEST / 10:00 AM EST. Signup and registration Is threat intelligence the apéritif to successful security Read More
12 Jul 2020News.ThreatQuotient Profile of a FounderAn exclusive Tech Tribune Q&A with Ryan Trost (co-founder and CTO) and Wayne Chiang (co-founder and Chief Architect) of Read More
12 Jul 2020FireEye.News The New Remote Workforce: Why Organizations Need Security Validation Now More Than EverThe way we collectively live, work and play has drastically changed. As social distancing measures continue, the human and economic costs are Read More
11 Jul 2020Forcepoint.Gartner.News Forcepoint Named a 2020 Gartner Peer Insights Customers’ Choice for Enterprise DLPThe Gartner Peer Insights Customers’ Choice is a recognition of vendors in this market by verified end-user professionals, taking into account Read More
11 Jul 2020Ivanti.News Ivanti to Announce Big Changes This MonthIt’s been a rough year in terms of… well, everything. But here at Ivanti, we’re delivering only good news this month. We Read More
11 Jul 2020News.Opentext Meeting your customers where they areIn a 2017 State of Global Customer Service Report by Microsoft, 98% of respondents said customer service was important in their brand choices and Read More
10 Jul 2020FireEye.News Opening Doors: Supporting Women Leaders Through Our Partnership With Athena AllianceThroughout my career, I was regularly the first and only woman in the room. As a junior law firm associate, I was often mistaken for an assistant Read More
10 Jul 2020Micro Focus.News #DevDay 2020 from the comfort of homeRecent world events regarding the pandemic of 2020 have emphasized the importance of digital readiness and modernizing core business… View Read More
9 Jul 2020Carbon Black.News TAU Threat Discovery: Conti RansomwareConti is a new family of ransomware observed in the wild by the Carbon Black Threat Analysis Unit (TAU). Unlike most ransomware, Conti Read More
8 Jul 2020FireEye.News Configuring a Windows Domain to Dynamically Analyze an Obfuscated Lateral Movement ToolWe recently encountered a large obfuscated malware sample that offered several interesting analysis challenges. It used virtualization that Read More
8 Jul 2020Cofense.News Phish Fryday – Cutting Through the Noise at IMAXLearn more: Security analysts need data – lots of data – to do their jobs defending organizations. It’s easy to drown in all the noise, though, Read More
7 Jul 2020News.Titus Orchestrating data security through effective data identificationHome » Blog » Orchestrating data security through effective data identification Maheswaran Shanmugasundaram · Tuesday, June 30th, 2020 As Read More
7 Jul 2020BeyondTrust.News Passwordless Administration Explained | BeyondTrustPasswordless Administration Explained | BeyondTrust July 6, 2020 Open You May Also Be Interested In: Our website uses cookies to provide a better Read More
7 Jul 2020News.Qualys F5 BIG-IP Remote Code Execution Vulnerability (CVE-2020-5902)F5 Networks recently released updates for the critical RCE vulnerability (CVE-2020-5902) that affects its BIG-IP products. The vulnerability that Read More
6 Jul 2020McAfee.News.Webinars Multi-Cloud Environment Challenges for Government AgenciesHybrid and multi-cloud architectures can offer government agencies the flexibility, enhanced security and capacity needed to achieve what they Read More
6 Jul 2020Micro Focus.News Refreshing Insights for Modern COBOLIntroduction In its seventh decade, COBOL’s heritage is legendary. This month sees yet another stride forward in COBOL innovation,… Read More
5 Jul 2020News.ThreatQuotient The hot technology talking point for the second half of 2020Ryan Trost, Co-Founder and CTO, ThreatQuotient, explains what he thinks will be the hot technology talking point for the second half of 2020. Read More
4 Jul 2020Forcepoint.News Forcepoint Minute Videos Now Available on Forcepoint.comIf your organization is currently looking to revamp its cloud security or data protection solutions, it will be worth a few minutes of your time Read More
4 Jul 2020News.Opentext Building secure communication resiliency at the desktopThe unprecedented events of 2020 have shown many organizations the cracks in their infrastructure. Faced with the sudden reality of remote work Read More
3 Jul 2020FireEye.News Cloud Security: Separating Fact From FictionCloud technologies offer cost and efficiency benefits to organizations in every industry worldwide; however, inexperience in working with cloud Read More
3 Jul 2020News.Riverbed Adaptive Thresholds | New AppResponse Adaptive Thresholds Reduces False Positives | RiverbedPerformance monitoring is typically based on comparing measurable values against a set of threshold values. In theory, the IT operations team Read More
2 Jul 2020Carbon Black.News 6 Best Practices to Fight a New Breed of Insider ThreatsThe current global pandemic has disrupted how organizations work. Some businesses quickly adapt while other organizations are still Read More
2 Jul 2020News.PROFITAP What is a Network Packet Broker?Network visibility is a necessity in today’s digital era. More enterprises are integrating network monitoring solution in their IT Read More
1 Jul 2020Checkmarx.News The Road to DevSecOps: Addressing the Challenges of AppSec AwarenessStephen: Since our world relies heavily on software, today more than ever before, software must equal security. In this context, what are your Read More
1 Jul 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week Ending June 28, 2020Cofense solutions enable organizations to identify, analyze, and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More
30 Jun 2020News.Titus Ep.3: Wally Bitaut – Titus Talks Cybersecurity PodcastLearn how Seclore and Titus works together in delivering a powerful, scalable data protection solution. Jason Hodgert · Tuesday, June Read More
30 Jun 2020Forcepoint.News Top 3 C-Level Risk Points: People, Places and ThingsPeople Especially with the plight we are currently facing, Dave characterizes his position as that of chief resilience officer. He makes the Read More
30 Jun 2020BeyondTrust.News Picking up Where Microsoft Leaves off with Modern Management, Endpoint & Application Security | BeyondTrustPicking up Where Microsoft Leaves off with Modern Management, Endpoint & Application Security | BeyondTrust June 26, 2020 Open You May Also Read More
30 Jun 2020News.Qualys Ripple20: Multiple Vulnerabilities Identified in Treck TCP/IP StackMultiple vulnerabilities that use a low-level TCP/IP software library developed by Treck, Inc. were identified recently in implementations of the Read More
29 Jun 2020NAKIVO.News Microsoft Office 365 and Data Protection: Risks in Shared Responsibility—New White PaperNAKIVO Blog > NAKIVO News > Microsoft Office 365 and Data Protection: Risks in Shared Responsibility—New White Paper June 26, 2020 by Grace Read More
29 Jun 2020Micro Focus.News How companies can lessen financial impacts through DX and technologyThe ‘new normal’ I’ve been chatting with many colleagues over the last few months as I learn more about digital transformation (DX) and work on Read More
28 Jun 2020News.Press releases.ThreatQuotient Combating the Threat Landscape in the Public SectorCombating the Threat Landscape in the Public Sector POSTED BY ANTHONY PERRIDGE 2019 saw a significant rise in ransomware attacks on public sector Read More
28 Jun 2020Allied Telesis.News Top 5 Reasons Why Your Healthcare Organization Should Use Wireless TechnologyTechnology has transformed the way healthcare providers practice and care for patients. For instance, electronic medical record-keeping no longer Read More
27 Jun 2020Forcepoint.News Secure Hybrid Access to Forcepoint Products with Azure Active DirectorySecurity products then started adopting standard identity protocols (e.g. RADIUS, LDAP) to enable central access and role management within their Read More
27 Jun 2020News.Opentext A new way of working reduces delays and eases sufferingWith a commitment to social transformation, the South African Department of Social Development (DSD) endeavors to provide a better life for the Read More
26 Jun 2020FireEye.News Sizing Up: How Mandiant Evaluates Ransomware DefenseOrganizations across various regions, industries, and sectors have identified ransomware as a significant risk and wonder if they are positioned Read More
26 Jun 2020Micro Focus.News I think, therefore I modernize: introducing Enterprise Suite 6.0I need to change – IT needs to change Rapid and large-scale IT change is a very costly exercise…. View Article (Feed generated with Read More
25 Jun 2020Carbon Black.News Popular Techniques Used by Cybercriminals Amid COVID-19(Editor’s Note: Gary Stevens, a technology writer, is posting as a guest author to carbonblack.com). Cybercriminals constantly Read More
25 Jun 2020Gartner.McAfee.News.Webinars What to Expect from the Next Generation of Secure Web GatewaysWhile secure web gateways (SWGs) have operated on a far more compressed timetable, a similarly drastic evolution has taken place. SWGs are still Read More
24 Jun 2020FireEye.News Clouds Are Secure, Are You Using Them Securely?Cloud technology isn’t new, but it’s still unfamiliar ground for many organizations. As if migrating to the cloud wasn’t already a massive Read More
24 Jun 2020Checkmarx.News It’s Time to Update Your Drupal Now!Drupal just recently released two major versions, which piqued our researchers’ interest. Once the team got to work on the two latest versions of Read More
24 Jun 202029 Jun 2020Group-IB.News.Press releases Group-IB enters the Adriatic region joining forces with Slovenia’s REAL securityMaribor, 24/06/20 – Group-IB, a Singapore-based cybersecurity company Group-IB, has signed a partnership agreement with REAL security. REAL Read More
24 Jun 202024 Jun 2020Group-IB.Press releases.Serbo-Croatian Group-IB vstopa v Adriatik regijo v sodelovanju s slovenskim REAL securityMaribor, 24/06/20 – Singapurska družba za kibernetsko varnost, Group-IB, je podpisala partnersko pogodbo z distributerjem dodane vrednosti REAL Read More
24 Jun 2020Backbox.News How Can Organizations Best Go About With Disaster Recovery Planning In 2020?How Can Organizations Best Go About With Disaster Recovery Planning In 2020? A disaster recovery plan is a document that protects an organization Read More
24 Jun 2020Cofense.News Practice Makes PerfectThe Phishing Defense Center (PDC) has discovered two distinct phishing campaigns found in environments protected by Proofpoint that spoof Twitter Read More
23 Jun 2020News.Titus Together we are stronger – Partnerships that workJames Phillips · Wednesday, June 17th, 2020 Over the last 12 months, I have been part of the Titus team that has pivoted the organization Read More
23 Jun 2020Forcepoint.News.Webinars Takeaways from New Federal IT Leadership ReportThe new report, Federal Cybersecurity in a Changing World, garnered feedback from federal IT practitioners on the state of cybersecurity today, Read More
23 Jun 2020BeyondTrust.News How Trusted Application Protection Builds on Application Control & Endpoint Privilege Management | BeyondTrustHow Trusted Application Protection Builds on Application Control & Endpoint Privilege Management | BeyondTrust June 18, 2020 Open You May Read More
23 Jun 2020Centrify.News Centrify’s Channel Leaps Forward with Reliance Program, New DistributorsSo far, the first half of 2020 has been busy at Centrify. We have focused on talking with our partners and customers to build a world-class Read More
22 Jun 2020NAKIVO.News NAKIVO Backup & Replication v10 Beta: What’s New?NAKIVO Blog > NAKIVO Backup & Replication > NAKIVO Backup & Replication v10 Beta: What’s New? June 18, 2020 by Grace Norman At Read More
21 Jun 2020News.Niagara Networks Niagara Networks Majestics Partner ProgramRecently, Niagara Networks formally announced its Majestics Partner Program in North America targeting the regional VAR, system integrator, Read More
21 Jun 2020News.Press releases.ThreatQuotient Maturing Approach as Cyber Threat Intelligence Pays DividendsMaturing Approach as Cyber Threat Intelligence Pays Dividends POSTED BY ANTHONY PERRIDGE In the battle to protect businesses from relentless Read More
21 Jun 2020FireEye.News Improve Security Effectiveness and Efficiency by Validating ToolsPublic-sector institutions are at high risk from a variety of threats, everything from nation state reconnaissance to data theft and ransomware. Read More
20 Jun 2020Forcepoint.News The SASE CyberSummit: What You Need to KnowBeyond the keynotes, our virtual summit will feature five practical 30-minute sessions designed to provide your organization with the building Read More
20 Jun 2020News.Opentext Empower your remote workforce with OpenText Anywhere on Microsoft AzureWith the recent increase in remote and home-based workers, organizations must now manage key applications and secure their remote workforce in a Read More
20 Jun 2020Centrify.News Keep Laser-Focused on Securing Access to Your Datacenter Servers and AppsDon’t Ignore Major Attack Surfaces Like Tenable and ServiceNow. A scary stat we’ve heard for a few years now is that around 80% of data breaches Read More
19 Jun 2020News.ThreatMark ThreatMark Listed as a Representative Vendor in Gartner’s Market Guide for Online Fraud DetectionWe are thrilled to announce that ThreatMark, a leading provider of a full-fledged banking fraud prevention solution, was selected by Gartner and Read More
19 Jun 2020FireEye.News Gaining Visibility and Threat Detection in Cloud Content With Box and FireEyeBusinesses share content internally and externally with suppliers, customers and others in a variety of ways. Technologies make it faster for Read More
19 Jun 2020Certgate Bluetooth BIAS Attacks? AirID is safe!BIAS Attack? AirID is not affected and especially safe – BIAS Attack has no chance on AirID. Düsseldorf, 29.05.2020, certgate, Read More
19 Jun 2020Micro Focus.News IDC Issues Commentary on Micro Focus and Smart Digital TransformationAnalysts from tier-one industry analyst firm, IDC, were invited to Micro Focus Universe last month to learn more about the company and our Read More
18 Jun 2020Carbon Black.News Court Ruling on Forensic Data Breach Reporting Flying Under the RadarOne thing that may have flown under the radar in recent weeks is that a court has ruled that Capital One must allow plaintiffs to review a Read More
18 Jun 2020News.Riverbed How to Solve Performance Issues When Your Traffic Is Encrypted With SSL | RiverbedWith the security concerns we face these days it’s ever so important for organizations to use encryption to secure their data in transit. And Read More
17 Jun 2020FireEye.News FLARE IDA Pro Script Series: MSDN Annotations Plugin for Malware AnalysisThe FireEye Labs Advanced Reverse Engineering (FLARE) Team continues to share knowledge and tools with the community. We started this blog series Read More
17 Jun 2020Checkmarx.News Bringing Your Retail Application Security Strategy Up to ParThis overnight shift to e-commerce dependence impacts all departments within retail organizations, especially IT and security. As marketing and Read More
17 Jun 2020Indeed Identity.News Webinar: Digital certificate management that is in tune with the timesWe are pleased to invite you to the online webinar “Digital certificate management that is in tune with the times.” prepared by Read More
17 Jun 2020Cofense.News New Mass Logger Malware Could Be MassiveCofense Intelligence is tracking a recently released keylogger named “Mass Logger” which could significantly impact the keylogger market and the Read More
16 Jun 2020News.Titus What do companies really do with your data?So you’ve just clicked ‘accept’ on a website’s cookie consent warning. Great! Now what? Jamie Manuel · Tuesday, June 9th, 2020 Serious Read More
16 Jun 2020Forcepoint.News Cloud Adoption: Is It Moving Faster Than Your Data Protection Strategy? (Part 2)Increasing visibility (covered in Part 1) Remaining flexible and agile Integrating on-premises and cloud security solutions In this post, I’ll Read More
16 Jun 2020BeyondTrust.News Raising the Bar on Government Endpoint Security | BeyondTrustRaising the Bar on Government Endpoint Security | BeyondTrust June 11, 2020 Open You May Also Be Interested In: Our website uses cookies to Read More
16 Jun 202016 Jun 2020Netwrix.News A Perfect Prebuilt Package for Auditing and ComplianceTo solve your most pressing audit and compliance needs, we offer a fixed-price bundle that includes Netwrix Auditor applications for three core Read More
16 Jun 2020News.Qualys Secure Your Global Remote WorkforceUpdate June 9, 2020: Qualys adds Malware Detection to Free 60 days Remote Endpoint Protection offering. This post has been updated to reflect Read More
16 Jun 2020Centrify.News Cloud Changes Everything When it Comes to PAMMy role as Director of Corporate Communications at Centrify requires me to wear many hats. One of them is heading up our public relations program Read More
15 Jun 2020News.Utimaco 7 Steps to Reduce Total Cost of Ownership Around HSMs to Gain Force in a Disrupting Finance MarketFor more information from Utimaco Blog, visit https://www.utimaco.com/Read More
14 Jun 2020News.Press releases.ThreatQuotient ThreatQuotient Granted DoDIN-Level Authority to OperateThreatQ is the first threat-centric security operations platform to be approved for a DoD-wide ATO Reston, Va. – June 10, 2020 – Read More
14 Jun 2020News.Versasec Releasing vSEC:CMS Version 5.8Date: 2020-06-08Author: Joakim Thorén, CEO Previous << Corona USS Rollout Version 5.8 is the fastest version of vSEC:CMS that we have ever Read More
13 Jun 2020Forcepoint.News Hackers Perspective on AI – Panel at Ai4CybersecurityAs is the case in recent months I find myself participating in virtual events. On May 14, I had the privilege of moderating a panel on the topic Read More
13 Jun 2020News.Opentext Cloud: The operating engine for information-fueled business transformationGuest blog by Melanie Posey, Research Vice President and General Manager, Voice of the Enterprise, 451 Research. In times of crisis, resiliency Read More
13 Jun 2020Centrify.News IDSA Report Reveals Continued Over-Confidence in Securing Privileged IdentitiesThe Identity Defined Security Alliance (IDSA) recently published a new report titled, “Identity Security: A Work in Progress,” about Read More
12 Jun 2020FireEye.News Intelligence-Led Threat Protection for SaaS-Mobile Workforce — FireEye Detection With CipherCloudWhen organizations turn to cloud apps to support the remote workforce and maintain business continuity, bad actors will follow. Employees working Read More
12 Jun 2020Micro Focus.News Sharpen your competitive edge using COBOL and mainframe systemsBrian Crane, Solution Director at Micro Focus, looks at the issues affecting IT leaders today and offers some rare insights into smart ways to Read More
11 Jun 2020Carbon Black.News TAU Threat Analysis: Hakbit RansomwareThe bad actor(s) behind Hakbit ransomware recently released an updated variant of their ransomware, which encrypts the victim’s Read More
11 Jun 2020Ivanti.News June Patch Tuesday 2020Microsoft resolves 129 unique common vulnerabilities and exposures (CVEs) this June, but there are no Publicly Disclosed or Exploited CVEs to be Read More
11 Jun 2020McAfee.News Quantifying Cloud Security EffectivenessSo now we have security tools in place to secure our cloud assets in SaaS, PaaS and IaaS. The next step is to determine what security controls Read More
10 Jun 2020FireEye.News FireEye Virtual Summit: Empower, Evolve and DefendIn today’s rapidly changing environment as digital attack surfaces are increasing, FireEye is proud to serve its mission to relentlessly protect Read More
10 Jun 2020Cofense.News Cofense Launches Free Resource Center and Searchable Database Highlighting the Latest Phishing Attacks that Bypass Email Security TechnologiesBuilt on the world’s largest data lake of phishing threats found by real people, Cofense combines the power of collective human detection and Read More
9 Jun 2020News.Titus Ep.2: Matt Henson – Titus Talks Cybersecurity PodcastHow to better understand trade compliance and how technology can help organizations streamline international trade Jason Hodgert · Read More
9 Jun 2020Forcepoint.News Forcepoint NGFW + Amazon GuardDuty = Increased Threat Detection and MonitoringIn this scenario, any security strategy needs an extended threat detection capability to identify attacks targeting both technology stacks Read More
9 Jun 2020BeyondTrust.News Security Questions Pose a High Risk: Learn Tips & Tricks to Mitigate the Threat | BeyondTrustSecurity Questions Pose a High Risk: Learn Tips & Tricks to Mitigate the Threat | BeyondTrust June 5, 2020 Open You May Also Be Interested Read More
9 Jun 2020News.Qualys Product, API & Library Notifications Move to Notifications.qualys.comQualys has consolidated notifications of new product features, API changes, and policy library updates at Qualys Notifications to make it easier Read More
8 Jun 2020NAKIVO.News NAKIVO Backup & Replication v9.4 Introduces Backup to Amazon S3, P2V Recovery and MoreNAKIVO Blog > NAKIVO Backup & Replication > NAKIVO Backup & Replication v9.4 Introduces Backup to Amazon S3, P2V Recovery and More Read More
7 Jun 2020News.Niagara Networks Network Flexibility and AgilityCaltech has an amazing history of scientific discoveries and breakthroughs. For many people Caltech is synonymous with “rocket Read More
7 Jun 2020News.ThreatQuotient Strengthen Cybersecurity With These 3 Steps to Rapid ResponsePlanning for Rapid Response Will Help Ensure You Have a Foundation in Place During Times of Crisis Crises and outbreaks change us and society, Read More
7 Jun 2020FireEye.News Security Without Barriers, Part Two: Planning for Cyber ResilienceThe network perimeter was a key component for defense-in-depth cyber security strategies, separating the internal “trusted” environment from the Read More
6 Jun 2020Forcepoint.News.Webinars 3 Tips to Protect Essential Data in a Multi-cloud EnvironmentAs more data moves to the cloud—and employees are expected to work from anywhere, at any time, on any device—security teams are challenged to Read More
6 Jun 2020News.Opentext Rapid Radiology puts the focus on senior careAs one of the largest teleradiology providers in the U.S., Rapid Radiology was established to expedite and enhance patient diagnosis and Read More
6 Jun 2020Centrify.News Secure Remote Access Blog Part 2: The Best ApproachWelcome back! This is the second part of a blog about Secure Remote Access for IT Administrators, which highlights Good/Better