3 Feb 2023News.Riverbed Don’t Wait for Zero Day – Proactively Detect Threats with Alluvio | RiverbedYour personal information being leaked or sold online is something that strikes fear into the hearts of most people. Identity theft takes this Read More 3 Feb 2023News.Riverbed Don’t Wait for Zero Day – Proactively Detect Threats with Alluvio | RiverbedYour personal information being leaked or sold online is something that strikes fear into the hearts of most people. Identity theft takes this Read More 3 Feb 2023Micro Focus.News OpenText Welcomes Micro Focus Customers, Partners and EmployeesOpenText CEO and CTO Mark Barrenechea blogs on how the Micro Focus acquisition expands OpenText’s mission to help enterprise… View Read More 2 Feb 2023News.PROFITAP The advantages of ProfiShark as a portable network traffic capture deviceProfiShark is a portable network traffic capture device that is designed for use in a variety of scenarios, including network troubleshooting, Read More 31 Jan 2023BeyondTrust.News.Webinars 5 Key IT Service Desk Improvement Trends | BeyondTrustWhat are the key improvement areas your IT service desk needs to focus on? Of course, there are the metrics and key performance indicators (KPIs) Read More 31 Jan 2023News.Qualys Managing Security Configuration Risk with the Most Comprehensive Configuration Compliance Solution!Table of Contents Qualys leads the industry with 850 policies, 19000 controls, 350 technologies, and 100 frameworks Remote and hybrid work, Read More 30 Jan 2023Micro Focus.News I Feel the Need, The Need for SpeedChad Lerash is Global Campaigns Program Manager at Micro Focus and a motorsports fanatic. This, the second post in his series following Jaguar Read More 29 Jan 2023News.Press releases.ThreatQuotient.Webinars Effectively meeting and exceeding the requirements of the SAMA Cyber Threat Intelligence PrinciplesEffectively meeting and exceeding the requirements of the SAMA Cyber Threat Intelligence Principles Munaf Kazi Responsible for supervising nearly Read More 28 Jan 2023Forcepoint.News Forcepoint Releases DLP at Scale to CustomersEnabling DLP at greater scale We also recently extended the capabilities of Risk-Adaptive Protection, helping customers utilize this powerful Read More 24 Jan 2023BeyondTrust.News BeyondTrust Achieves FedRAMP Moderate “In-Process”… | BeyondTrustBeyondTrust has achieved the “In Process” designation for its Remote Support (RS) and Privileged Remote Access (PRA) solutions by the Federal Read More 24 Jan 2023News.Qualys The January 2023 Oracle Critical Patch Update Last updated on: January 18, 2023 This Oracle Critical Patch Update contains a group of patches for multiple security vulnerabilities that Read More 23 Jan 2023Micro Focus.News Jaguar TCS Racing and Micro Focus— Sustainability at Peak VelocityMicro Focus is the technical partner of Jaguar TCS Racing, which last November launched its new Jaguar I-TYPE 6, the lightest, fastest, most Read More 22 Jan 2023News.Niagara Networks Quantum Computing and the Impact on Data EncryptionQuantum computing has the potential to revolutionize many fields, including encryption. In recent years, there has been a lot of interest in Read More 22 Jan 2023News.Press releases.ThreatQuotient.Webinars Here’s What ThreatQuotient’s Crystal Ball Says for 2023Here’s What ThreatQuotient’s Crystal Ball Says for 2023 Dave Krasik From the team at ThreatQuotient, we hope you had a wonderful 2022 Read More 21 Jan 2023Forcepoint.News Security News—Breaking RSA Encryption, Hacks at Royal Mail, PayPal and T-Mobile and More ChatGPTPayPal is notifying thousands of users that their accounts were accessed through a large-scale credential stuffing attack that exposed some Read More 19 Jan 2023News.ThreatMark The Phishers Favorite PondIn an effort to keep our customers up to speed on the latest trends when it comes to fraud detection and prevention, ThreatMark presents our Read More 18 Jan 2023News.Riverbed Diagnosing and Treating Network Challenges in Public Hospitals | RiverbedTechnology has changed how the healthcare industry functions in almost every aspect, from providing care to managing patient records to Read More 17 Jan 2023BeyondTrust.News What is the IT Support Swarming Model & How Can You… | BeyondTrustToday’s technology support landscape is rapidly changing. Whether you’re supporting internal employees or external customers, your end-users are Read More 17 Jan 2023News.Qualys Detection of Vulnerabilities in JavaScript LibrariesJavaScript is a popular programming language which is an integral component while developing interactive and dynamic web applications. It allows Read More 15 Jan 2023News.ThreatQuotient SANS CyberThreat: an inside track on Europe’s premier cyber security conferenceIn January the eyes of the global cyber security community will turn to London as the Cyberthreat conference gets under way. First launched Read More 14 Jan 2023Forcepoint.News Forcepoint Earns Spot on Built In’s Best Places to Work in Multiple CitiesThank you, Team Forcepoint. Your involvement in Employee Resource Groups, think tanks, holiday celebrations and Hackathons, to name just a few, Read More 13 Jan 202313 Jan 2023News.Webinars Fortra featuring Forrester; Cybersecurity Threats In Europe: What You Need to Know and What to Do About ThemRead More 10 Jan 2023BeyondTrust.News Cyber Insurance: What it is, What is Covered, & How to… | BeyondTrustWhat is cyber insurance? A cyber insurance policy is an insurance product designed to protect an organization from the risks associated with Read More 10 Jan 2023News.Qualys Implement Risk-Based Vulnerability Management with Qualys TruRisk™: Part 3In this final blog of the series, we will discuss the importance of implementing effective risk-based remediation strategies to reduce the risk Read More 9 Jan 2023Micro Focus.News IT Strategy—Is a Democracy Merited?IT decisions—not always popular, and often taken in isolation. What can IT leaders do to make IT strategy more inclusive and—crucially—more Read More 8 Jan 2023News.ThreatQuotient XDR and the Age-old Problem of Alert FatigueXDR’s fully loaded value to threat detection, investigation and response will only be realized when it is viewed as an architecture Read More 7 Jan 2023Forcepoint.Gartner.News Security News—ChatGPT Mania Continues, AI’s Role in Cybersecurity, New Breaches at CircleCI and Slack and MoreDefensive vs. offensive AI: Why security teams are losing the AI war Here’s an overview of some other cybersecurity stories getting our Read More 3 Jan 2023News.Qualys Qualys Threat Research Unit: Threat Thursdays, December 2022 Welcome to the fourth edition of the Qualys Threat Research Unit’s (TRU) “Threat Research Thursday”, where we collect and curate notable new Read More 3 Jan 2023News.Riverbed Improving Digitized Work Processes with DEX | RiverbedIn my last blog article, I drew the comparison between the engine warning light in a car and IT monitoring. But what does that mean in detail? An Read More 2 Jan 2023News.PROFITAP How to TAP 40/100G BiDi connectionsBandwidth demand in data centers and campus networks is increasing due to growing virtualization. In data centers, this has a particular impact Read More 27 Dec 2022BeyondTrust.News Technology Alliance Outlook for 2023 and Beyond | BeyondTrust‘Tis the season for being merry—and of course for all the end-of-year recaps and projections for next year. I wanted to jump on this bandwagon, Read More 25 Dec 2022News.Press releases.ThreatQuotient 2022, Naughty or Nice?2022, Naughty or Nice? Noor Boulos There were so many notable things that have happened in 2022, here’s some to name a few. We have Read More 24 Dec 2022Forcepoint.News Security News—LastPass and Okta Hacks and MorePassword manager company LastPass has confirmed that its customers’ encrypted password vaults, which store passwords and other secrets, Read More 23 Dec 2022Micro Focus.News Tis the Season for Formula E RacingMicro Focus recently renewed our technical partnership with Jaguar TCS Racing for Season 9 of the ABB FIA Formula E Championship. The start of Read More 20 Dec 2022News.Qualys Implement Risk-Based Vulnerability Management with Qualys TruRisk™ : Part 2This blog is a continuation of our first blog on implementing risk-based vulnerability management with Qualys TruRiskTM. In the first blog, we Read More 19 Dec 2022News.ThreatMark The Phishers Greatest AllyIn an effort to keep our customers up to speed on the latest trends when it comes to fraud detection and prevention, ThreatMark presents our Read More 18 Dec 2022News.Press releases.ThreatQuotient.Webinars Tis’ the Season to Read the Hottest TopicsTis’ the Season to Read the Hottest Topics Julia Weifenbach If you find yourself searching for something to summarize the year, Read More 17 Dec 2022Forcepoint.News Five Steps to Simplifying Zero Trust Security with Data-first SASEFor example, many organizations already have investments in Web Security or Cloud Security, but don’t yet have Zero Trust Network Access (ZTNA) Read More 13 Dec 2022BeyondTrust.News Credentials Flagged as Leading Cause of Malicious… | BeyondTrustSince the publication of the first of the Notifiable Data Breach reports by the Office of the Australian Information Commissioner (OAIC), Read More 13 Dec 2022News.Qualys Operationalizing Qualys VMDR With Qualys TruRisk™ – Part 1For today’s CISOs, managing cyber risk is Job #1 priority, and it’s a full-time concern. Security practitioners are spending a considerable Read More 11 Dec 2022News.ThreatQuotient Removing the Barriers to Security Automation ImplementationImplementation of security automation can be overwhelming, and has remained a barrier to adoption Previously, I wrote about balancing Read More 10 Dec 2022Forcepoint.News Forcepoint Data Visibility—Shine a Light on Dark DataHow can you protect data you effectively can’t even see?” This worthless data is often called “dark data.” What makes it Read More 6 Dec 2022News.Titus Lookout and Fortra Partner to Secure Sensitive Data Across the EnterpriseFortra Webmaster · Thursday, December 1st, 2022 Editor’s Note: This blog post was co-authored by Clayton Barnard, Senior Director, Global Read More 6 Dec 2022Forcepoint.Gartner.News Single-vendor SASE will bring data security to every user, app and deviceWe have no choice. The sheer cost of managing solutions compounded by quiet quitters and mass resignations are driving resource-strapped teams to Read More 6 Dec 2022BeyondTrust.News Implementing User Account Control (UAC) Best Practices… | BeyondTrustWhat is User Account Control (UAC)? User Account Control (UAC) is a security feature in the Windows Operating System designed to mitigate the Read More 6 Dec 2022News.Qualys The 9th Google Chrome Zero-Day Threat this Year – Again Just Before the WeekendGoogle has released yet another security update for the Chrome desktop web browser to address a high-severity vulnerability that is being Read More 4 Dec 2022News.Press releases.ThreatQuotient.Webinars Thinking of a SecOps Platform? Showing ROI Just Got EasierThinking of a SecOps Platform? Showing ROI Just Got Easier Noor Boulos As threats have continued to evolve, enterprises have made significant Read More 3 Dec 2022Forcepoint.News Zero Trust CDR Early Access Program: Stop Email Malware NowImagine a brand new, clean data file attached to all emails… and what is being sent out to partners is malware free. Click and use – the file Read More 3 Dec 2022News.Riverbed When an Engine Warning Light Goes On | RiverbedWhile on our summer vacation this year with our Volkswagen Van (“Bulli”), the engine warning light came on. Unfortunately, it was still over 700 Read More 2 Dec 2022Micro Focus.News 4 Ways Micro Focus and AG Ran and Transformed at the Same TimeMicro Focus announced the successful modernization of AG’s mission-critical business systems. AG is Belgium’s largest insurance company, serving Read More 29 Nov 2022Forcepoint.News Using Hardware Logic to Protect Critical InfrastructureGood cyber hygiene — anti-virus scanning and keeping patches up to date – is essential, but these defenses don’t go far enough. Relying on Read More 29 Nov 2022BeyondTrust.News SSH Key Management Overview & 10 Best Practices | BeyondTrustWhat are SSH Keys? Secure Socket Shell (SSH), also called Secure Shell, is a special network protocol leveraging public-key cryptography to Read More 29 Nov 2022News.Qualys Ease Your Cybersecurity Maturity Model Certification Journey With QualysThe Cybersecurity Maturity Model Certification (CMMC) is a cybersecurity training, certification, and assessment program from the United States Read More 27 Nov 2022News.ThreatMark Protecting the PondIn an effort to keep our customers up to speed on the latest trends when it comes to fraud detection and prevention, ThreatMark presents our Read More 25 Nov 2022Micro Focus.News Meet Sarah Martin – EMEA Talent Acquisition ConsultantSoftware, from vision to execution, is a people business – and at Micro Focus, our people are our greatest asset. Helping our employees build Read More 22 Nov 2022Forcepoint.News How agencies are moving zero trust from aspiration to transformationBut as they speed up their adoption of zero-trust security, they still face challenges with legacy applications and architectural gaps; Read More 22 Nov 2022BeyondTrust.News Channeling Cyber psychology to Better Cybersecurity | BeyondTrustIn terms of cybersecurity, an organization’s people (users) are frequently identified as potentially the greatest weakness—the enterprise’s Read More 20 Nov 2022News.Press releases.ThreatQuotient.Webinars How Sysdig is Using the ThreatQ Platform to Enhance Cloud Threat Detection and ResponseHow Sysdig is Using the ThreatQ Platform to Enhance Cloud Threat Detection and Response Michael Clark, Director of Threat Research at Sysdig It Read More 19 Nov 2022News.ThreatMark Don’t Take the BaitIn an effort to keep our customers up to speed on the latest trends when it comes to threat detection and fraud prevention, ThreatMark presents Read More 19 Nov 2022Forcepoint.News Zero Trust Web Access: Making it easy to extend Zero Trust to web access with Forcepoint ONEOne thing that has often been overlooked though is the typical user’s dependency on general web access. It’s important since general web use is Read More 18 Nov 2022News.Riverbed EMA Releases New Report on Network Observability | RiverbedThe recently released report by Enterprise Management Associates (EMA), Network Observability: Delivering Actionable Insights to Network Read More 18 Nov 2022News.Riverbed EMA Releases New Report on Network Observability | RiverbedThe recently released report by Enterprise Management Associates (EMA), Network Observability: Delivering Actionable Insights to Network Read More 18 Nov 2022Micro Focus.News Transforming Towards What?In our latest Professional Services blog, Micro Focus’ Consulting Manager Joshua Brusse argues that transforming into a Digital Factory is Read More 15 Nov 2022News.Titus The Magical Implementation – Preshow AudienceDana McMullan · Wednesday, November 9th, 2022 A magical and practical series of tips, tricks, and a real-world guide to implementing Read More 15 Nov 2022BeyondTrust.News Threat Intelligence: An Explainer | BeyondTrustWhat is threat intelligence? Threat intelligence (also referred to as cyber threat intelligence) collects data and information about threat Read More 15 Nov 2022News.Qualys QSC 2022: That’s a Wrap!Over the years, the threat landscape has exploded, and bad actors have become increasingly sophisticated, making the demand for cloud security Read More 13 Nov 2022News.ThreatQuotient Staying ahead of advanced threats with ThreatQuotientIn an interview with Rahul Raj, Chris Jacob, Global Vice President of ThreatQuotient emphasized the importance of threat segmentation, Read More 12 Nov 2022Forcepoint.News SASE—How to separate the good, the bad, and the uglySASE provides a key path to Zero Trust Yet due to this popularity so many tools and services have applied the SASE moniker to themselves that Read More 8 Nov 2022Forcepoint.News New Solutions to the Evolving Definition of Insider RisksIn some cases, these issues have created significant workplace challenges. Look no further than the pushback some companies have received from Read More 8 Nov 2022News.Qualys OpenSSL Vulnerability RecapLast week a CRITICAL vulnerability in OpenSSL was pre-announced to give organizations a head start in coming up with a playbook for how to Read More 6 Nov 2022News.ThreatQuotient ThreatQuotient lanza su nuevo informe anual sobre el Estado de la Automatización de la Ciberseguridad en las EmpresasLos resultados de la encuesta ponen de manifiesto qué casos de uso de la automatización están funcionando, cuáles Read More 5 Nov 2022Forcepoint.News 2023 State of Security Report: Strive for SimplicityBut for all the benefits brought to the field, companies didn’t escape the downsides. Now, they’re striving to simplify security. A flurry of Read More 4 Nov 2022Micro Focus.News Build Strong Digital Transformation PartnershipsGM of Professional Services Jim Sargent explains why you should find partners to help plan and execute digital transformation initiatives. Find Read More 3 Nov 2022News.Riverbed EMA Names Aternity a Value Leader In DEX | Riverbedfirst EMA Radar™ for Digital Employee Experience Management (DEX) is hot off the press from Enterprise Management Associates®. This report Read More 2 Nov 2022News.PROFITAP Profitap IOTA: Efficient analysis of VoIP issues The transmission of voice over the IP protocol poses various challenges both in corporate networks and in the provider environment. First, Read More 1 Nov 2022Forcepoint.News Hackers Exploit PayPal Invoicing Bug to Launch Advanced Phishing AttacksWith my initial scepticism high, I decided to investigate to see if someone had managed to spoof the domain of PayPal.com. PayPal invoicing is a Read More 1 Nov 2022BeyondTrust.News OpenSSL Security Vulnerability | BeyondTrustThe OpenSSL Organization has announced a critical security vulnerability in versions 3.0.x and above. According to the OpenSSL project team, an Read More 1 Nov 2022News.Qualys Qualys Research Alert: Prepare for a Critical Vulnerability in OpenSSL 3.0On Tuesday, November 1, 2022, the OpenSSL project will release a new version of OpenSSL version 3.0.7 that will patch an as-yet-undisclosed Read More 30 Oct 2022News.Press releases.ThreatQuotient Wrapping up CSAM 2022 with Vulnerability Management Advice for EveryoneWrapping up CSAM 2022 with Vulnerability Management Advice for Everyone Chris Jacob As we wrap up Cybersecurity Awareness Month (CSAM) 2022, the Read More 29 Oct 2022Forcepoint.News Forcepoint Security News ReturnsCISA adds Apple zero-day, Cisco and Gigabyte bugs to exploited vulnerabilities list Here are some top recent security stories getting our Read More 25 Oct 2022Forcepoint.News Insider Threat Awareness Month: A To The Point Cybersecurity Podcast RecapIf your organization is looking to better protect itself from insider threats, we invite you to listen to these episodes, or better Read More 25 Oct 2022BeyondTrust.News Growth Hacking by HackathonBeyondTrust’s September 2022 Hackathon recently concluded, but not before spurring some impressive innovations from our engineering team. Read on Read More 23 Oct 2022News.Press releases.ThreatQuotient Phishing Scams Have Reached New Heights: How to Improve Detection and ResponsePhishing Scams Have Reached New Heights: How to Improve Detection and Response Leon Ward The Anti-Phishing Working Group (APWG) Phishing Activity Read More 22 Oct 2022Forcepoint.News To Make Your Hybrid Workforce More Productive, Focus on Application Access and PerformanceSpot and deal with application performance issues before they become problems To help you with this, Forcepoint is bringing out a series of Read More 21 Oct 2022Micro Focus.News Core System Modernization—A Beastly Challenge?Standfirst: Darwin famously stated that only the most adaptable will survive. How that plays out in enterprise technology raises questions about Read More 18 Oct 2022News.Titus Data Protection Myths and the Truths Behind ThemHelpSystems Webmaster · Thursday, October 13th, 2022 To implement or not to implement? That is the question when evaluating a new Read More 18 Oct 2022BeyondTrust.News Remote Support 22.3 provides many new enhancementsBeyondTrust is pleased to announce the availability of version 22.3 of our leading Remote Support solution. From the /login search functionality Read More 18 Oct 2022News.Qualys CISA BOD 23-01: Meeting and Exceeding CISA Requirements with QualysThe latest Binding Operational Directive from the Cybersecurity and Infrastructure Security Agency (CISA) BOD 23-01 requires agencies to Read More 18 Oct 2022News.Riverbed AIOps and Observability: What’s the Difference? | RiverbedInterest in AIOps and observability tools sky-rocketed over the past couple of years as IT teams face the challenge of managing today’s IT Read More 16 Oct 2022News.ThreatQuotient Anticipation and Action: What’s Next in SOC Modernization“Wisdom consists of the anticipation of consequences.” – Norman Cousins In the cybersecurity industry, we’ve Read More 15 Oct 2022Forcepoint.News The Increasingly Complex Threat Landscape Must be Fought with SimplicityIndeed, new research from Forcepoint found 65% of U.K. and U.S. CNI organizations have fallen victim to a cyberattack and 57% to a ransomware Read More 11 Oct 2022News.Titus “See Yourself in Cyber” and Stay Ahead of Cybersecurity Threats – Cybersecurity Awareness Month 2022Home » Titus Blog » “See Yourself in Cyber” and Stay Ahead of Cybersecurity Threats – Cybersecurity Awareness Month 2022 HelpSystems Webmaster Read More 11 Oct 2022Forcepoint.News CISA Directive: Federal Agencies Must Improve Cybersecurity Asset Visibility and Vulnerability DetectionCISA states the directive supports many other mandates and guidance that has previously been established, including the Executive Order 14028 on Read More 11 Oct 2022News.Qualys In-Depth Look Into Data-Driven Science Behind Qualys TruRiskVulnerability Management is a foundational component of any cybersecurity program for the implementation of appropriate security controls and the Read More 9 Oct 2022News.Press releases.ThreatQuotient Help Enable Smarter Decisions During Cybersecurity Awareness MonthHelp Enable Smarter Decisions During Cybersecurity Awareness Month Noor Boulos Do a quick search for the top cybersecurity breaches thus far in Read More 8 Oct 2022Forcepoint.News Inside the James Webb Attack ImageAppending data to an image is a well-known way of hiding malware. In this case, the executable data is Base64 encoded and surrounded by markers Read More 4 Oct 2022BeyondTrust.News.Webinars Cyber Claims: The Real Role of Forensic Analysis | BeyondTrustWhat is a Cyber Claim? A cyber claim is how a cyber insurance policy – insuring against ransomware, malware, cyber breaches, etc. – is Read More 4 Oct 2022News.Qualys WhatsApp Fixed Critical Vulnerabilities that Could Let an Attacker Hack Devices Remotely – Automatically Discover and Remediate Using VMDR MobileWhatsApp has recently fixed critical and high-severity vulnerabilities affecting WhatsApp for Android, WhatsApp Business for Android, WhatsApp Read More 3 Oct 2022News.Riverbed Digital Experience Alphabet Soup | RiverbedMeasuring and improving the digital experience of employees and customers has risen in priority over the past couple of years. Several factors Read More 2 Oct 2022News.Press releases.ThreatQuotient Unlock the Power of Automation: Vulnerability ManagementUnlock the Power of Automation: Vulnerability Management Dave Krasik We’ve spoken extensively about the importance of taking a data-driven Read More 1 Oct 2022Forcepoint.News Forcepoint at GITEX Global 2022 in Dubai Beginning 10 OctoberDuring this year’s GITEX, we’ll have lots of things planned throughout the show. At our booth in Hall 2 Stand A30, we’ll have product experts Read More 27 Sep 2022Forcepoint.News An Update on Forcepoint’s Digital Customer Engagement Journey1) The accelerated shift to cloud applications and 2) The need to protect workers and data regardless of location. Through that evaluation, a Read More 27 Sep 2022BeyondTrust.News 10 Common Social Engineering AttacksWhat is Social Engineering? Also known as “human hacking,” social engineering attacks use psychologically manipulative tactics to influence a Read More 27 Sep 2022News.Qualys Why Organizations Struggle with Patch Management (and What to Do about It)The cybersecurity attack surface continues to grow exponentially. Modern technologies are being deployed on-premises and in the cloud as part of Read More 26 Sep 202226 Sep 2022Educate yourself about Cybersecurity.Netwrix.News Full-scale Identity and Access Governance Solution from Netwrix + Portfolio overviewRead More 25 Sep 2022News.ThreatQuotient How Organizational Structure, Personalities and Politics Can Get in the Way of SecurityCyberattacks and data breaches continue to rise year-over-year and another so-called silver bullet technology isn’t going to stop that Read More 24 Sep 2022Forcepoint.News Protecting a Hot Wallet ServiceWhile you can open a cash wallet with your hands, to use a digital wallet you need a computer. The digital wallet might just be some data, and Read More 23 Sep 2022Micro Focus.News September’s Month of Volunteering: How Our Actions Today, Impact TomorrowAt Micro Focus, September is our INSPIRE Month of Volunteering. Inclusion is at the heart of the INSPIRE program, and through our volunteering Read More 20 Sep 2022News.Titus Guarding Against Insider ThreatsHelpSystems Webmaster · Thursday, September 15th, 2022 When you see or hear the term “data breach” in the media, is the first thought Read More 20 Sep 2022BeyondTrust.News Top IoT Security Risks and Vulnerabilities and How to Mitigate Them | BeyondTrustIoT is now pervasive and often represents a security weak link in enterprises. It’s far past time for organizations to account for IoT as part of Read More 20 Sep 2022News.Qualys September 2022 Patch Tuesday | Microsoft Releases 63 Vulnerabilities with 5 Critical, plus 16 Microsoft Edge (Chromium-Based); Adobe Releases 7 Advisories, 63 Vulnerabilities with 35 Critical.Microsoft has fixed 63 vulnerabilities (aka flaws) in the September 2022 update, including five (5) vulnerabilities classified as Critical as Read More 18 Sep 2022News.ThreatQuotient Sesame IT chooses ThreatQuotient to ensure its clients receive high quality Threat IntelParis, 13th September 2022 – threat detection specialist Sesame IT has teamed up with ThreatQuotient™ – a pioneer in threat Read More 18 Sep 2022News.Riverbed Alluvio IQ: Solve Problems Fast at Any IT Skill LevelIT has a problem–well, quite a few problems. Monitoring tools are supposed to help network teams find and fix tech problems, but all too Read More 17 Sep 2022Forcepoint.News Uber Hack – What we know so farInside the internal intranet were some PowerShell scripts that the attacker supposedly used to access core services such as AWS, Slack and Read More 16 Sep 2022Micro Focus.News Micro Focus Sponsors Grace Hopper Celebration 2022Micro Focus is proud to be part of the Grace Hopper Celebration to help shape a more inclusive and gender-balanced technology industry – while Read More 14 Sep 202214 Sep 2022Educate yourself about Cybersecurity HelpSystems Cybersecurity WeekRead More 13 Sep 2022News.Titus The Magical Implementation – Awareness, Safety Crews, and Plans for Potentially Dangerous StuntsHome » Titus Blog » The Magical Implementation – Awareness, Safety Crews, and Plans for Potentially Dangerous Stunts Dana McMullan · Read More 13 Sep 2022BeyondTrust.News Insider Threat Indicators: How to Identify & Mitigate Insider Attacks | BeyondTrustWhat is an insider threat? An insider threat is an internal persona acting as a trusted asset (employee, contractor, vendor, partner, etc.) Read More 13 Sep 2022News.Qualys Let Smart Automation Reduce the Risk of Zero-Day Attacks on Third-Party ApplicationsLast week, Google released yet another zero-day patch for its Chrome browser to fix a high-severity flaw that was already being exploited. That Read More 11 Sep 2022News.Press releases.ThreatQuotient Unlock the Power of Security Automation: Threat Intelligence ManagementUnlock the Power of Security Automation: Threat Intelligence Management Chris Jacob Threat intelligence has become a significant input to the Read More 10 Sep 2022Forcepoint.Gartner.News Forcepoint at the Gartner Security & Risk Management Summit Next WeekThe trend is clear—companies continue to invest more in cybersecurity products and solutions. And chances are good that your organization has Read More 6 Sep 2022Forcepoint.News Understanding the Interconnectedness of Cybersecurity and PrivacyThese events are reminders of how globally interconnected our networks, supply chains and daily lives have become. More than one-half of the Read More 6 Sep 2022BeyondTrust.News When Clickbait Goes BadEveryone makes mistakes, but when something as simple as a single click can have ruinous impacts on your identity, your bank account, and your Read More 6 Sep 2022News.Qualys Introducing Qualys Threat Research ThursdaysWelcome to the first edition of the Qualys Research Team’s “Threat Research Thursday” where we collect and curate notable new tools, techniques, Read More 5 Sep 2022Micro Focus.News What Does Strategic Transformation Mean for Your Business?Strategic transformation can take many forms and address myriad business challenges. In his third installment of his “How to Run and Transform” Read More 4 Sep 2022News.Press releases.ThreatQuotient Unlock the Power of Security Automation: 3 Use Cases to ConsiderUnlock the Power of Security Automation: 3 Use Cases to Consider Leon Ward At ThreatQuotient, we write a lot about security automation. Most Read More 3 Sep 2022Forcepoint.News The Answer to the Zero Trust ChallengeIt’s time to pivot from relying on detection alone. With Zero Trust CDR you can eliminate threats before they enter and prevent data loss via Read More 3 Sep 2022News.Riverbed Improve Your Employee’s Experience With MS Teams, Alluvio | RiverbedAlluvio can show the number calls with high latency, jitter, and packet loss out of total the calls made. You can easily identify the call Read More 30 Aug 2022BeyondTrust.News Cisco Breach – A Cautionary Tale of Mismanaged Credentials & Privileged Identities | BeyondTrustOn the 10th of August 2022, Cisco confirmed they had been breached by the Yanluowang ransomware group. On the same day, the Yanluowang group Read More 30 Aug 2022News.Qualys Mitigating the Risk of Zero-Day Vulnerabilities by using Compensating ControlsZero-day vulnerability attacks have emerged as a major cybersecurity threat in the last few years. Organizations most often targeted include Read More 28 Aug 2022News.Press releases.ThreatQuotient As the Cyber Threat Environment Escalates, How are Organizations Responding?As the Cyber Threat Environment Escalates, How are Organizations Responding? Cyrille Badeau Globally, the cyber threat level to organizations Read More 27 Aug 2022News.ThreatMark New Phishing Campaign IdentifiedOn August 4th, 2022 we discovered and confirmed an active phishing campaign targeting users of multiple major European banks from a single web Read More 27 Aug 2022Forcepoint.Gartner.News Eliminating Zero Trust ComplexityThis isn’t the first time the federal government has been mandated to strengthen cybersecurity programs. Back in 2002 and later amended in Read More 26 Aug 2022Micro Focus.News Is Digital Transformation a Trap?It’s planning time for a new fiscal year, and IT organizations are hearing the words “digital transformation” with great frequency. In a new Read More 23 Aug 2022News.Titus The CMMC ProgramHelpSystems Webmaster · Thursday, August 18th, 2022 As the number of new data privacy regulations and programs coming into effect in the Read More 23 Aug 2022BeyondTrust.News One-Time Password (OTP) Solutions for Privileged Access | BeyondTrustWhat are one-time passwords? A one-time password (OTP) is the password used in a credential pair that is valid for only one login session or Read More 23 Aug 2022Gartner.News.Skyhigh Security The customers have spoken | Gartner ‘Voice of the Customer’ ReportRead More 23 Aug 2022News.Qualys Qualys VMDR Recognized as Best VM Solution by SC Awards 2022 & Leader by GigaOmQualys VMDR has been recognized for its commanding industry leadership by both the 2022 SC Awards and analyst firm GigaOm. SC Magazine has Read More 21 Aug 2022News.Press releases.ThreatQuotient Breaking Barriers at Black Hat 2022 with Women in CybersecurityBreaking Barriers at Black Hat 2022 with Women in Cybersecurity Kasey Ello Women in Cybersecurity Happy Hour at Black Hat 2022 After more than Read More 18 Aug 2022News.Riverbed 6 Proven Strategies to Protect Networking Teams from Burnout | RiverbedIs your team feeling overworked, undervalued and frustrated? You’re not alone—the pandemic has put more pressure on almost all of us, especially Read More 16 Aug 2022BeyondTrust.News.Webinars How to Mitigate the Windows DogWalk Vulnerability | BeyondTrustThe Windows DogWalk vulnerability (CVE-2022-34713) presents a prime reminder of why a proactive approach to endpoint security is so important. Read More 16 Aug 2022News.Qualys Qualys Security Updates: Cloud Agent for LinuxThe security and protection of our customers is of the utmost importance to Qualys, as is transparency whenever issues arise. A customer Read More 14 Aug 2022News.Press releases.ThreatQuotient Cover these five topics before going forward with an M&AThe S&P Global 451 Research Tech M&A Outlook Survey found that the value of technology deals announced in 2021 exceeded $1 trillion for Read More 13 Aug 2022Forcepoint.News Mind the Gap – Security at the IT/OT BoundaryData Extraction 68% of business leaders feel their cybersecurity risks are increasing.” In normal operations, networked machines are capable of Read More 9 Aug 2022BeyondTrust.News 10 Must-Have Certifications for IT Support ProfessionalsWhat is an IT Support Certification? IT support certifications are recognized acknowledgements of specific experience, knowledge, and skills Read More 9 Aug 2022Gartner.News.Skyhigh Security Kaj je Security Service Edge (SSE)?Read More 9 Aug 2022News.Qualys A Deep Dive into VMDR 2.0 with Qualys TruRisk™The old way of ranking vulnerabilities doesn’t work anymore. Instead, enterprise security teams need to rate the true risks to their business. In Read More 8 Aug 2022Micro Focus.News Why AI is Essential for Value Stream ManagementIn the second installment of his “How to Run and Transform” blog series, Achmad Chadran reviews how Value Stream… View Article Read More 7 Aug 2022News.ThreatQuotient The Secret to Automation? Eat the Elephant in Chunks.The goal of security automation is to accelerate detection and response, but you’ll waste a lot of time if you try to eat the elephant all Read More 6 Aug 2022Forcepoint.Gartner.News Meeting 2024 Federal Zero Trust DeadlinesIn the recent report entitled “The Quest for Zero Trust,” presented by Fedscoop and sponsored by Forcepoint, researchers examined Read More 3 Aug 20223 Aug 2022News Adria Security Summit Powered by Intersec Returns to Zagreb as a Timely and Welcome GuestRead More 2 Aug 2022News.Titus The Magical Implementation – Picking the Right Assistant(s)Home » Titus Blog » The Magical Implementation – Picking the Right Assistant(s) Dana McMullan · Wednesday, July 20th, 2022 A magical and Read More 2 Aug 2022BeyondTrust.News The Power of Good Server and Endpoint Naming Conventions | BeyondTrustEndpoint & Server Naming – Standards Needed When I first started in information technology, one of the more humorous aspects was the Read More 2 Aug 2022News.Qualys Here’s a Simple Script to Detect the Stealthy Nation-State BPFDoorIn this blog, the Qualys Research Team explains the mechanics of a Linux malware variant named BPFdoor. We then demonstrate the efficacy of Read More 31 Jul 2022News.Press releases.ThreatQuotient Looking for Some Summer Reading? Check Out Our Top Blogs so Far this YearLooking for Some Summer Reading? Check Out Our Top Blogs so Far this Year Kasey Ello Summertime often means vacation time and a chance to rest, Read More 30 Jul 2022Forcepoint.News.Webinars Malware evolves constantly. Your security should too.Every minute, four companies fall victim to ransomware attacks.” In fact, here’s what DataProt said in a recent report: Is your Read More 26 Jul 2022Forcepoint.News Ukraine and Beyond: A ‘To The Point Cybersecurity’ Podcast RecapHere’s a quick look at some of the key insights from recent episodes: Over the past few months, a range of experts have weighed in on these Read More 26 Jul 2022BeyondTrust.News.Webinars Linux Attack & Defense: Matrix Breakout Edition | BeyondTrustAs a penetration tester, I enjoy playing the Capture the Flag (CTF) challenges you’ll find on VulnHub.com or at an information security Read More 26 Jul 2022News.Qualys Integrating JIRA to the Qualys Cloud PlatformThis is the second in a blog series on integrations to the Qualys Cloud Platform. This post looks at what are the requirements to build a Read More 24 Jul 2022Gartner.News.Press releases.ThreatQuotient Security Automation, Lessons Learned from Top Gun: MaverickSecurity Automation, Lessons Learned from Top Gun: Maverick Marc Solomon The cybersecurity industry has talked about security automation for Read More 23 Jul 2022Forcepoint.News The Evolution of CybersecurityWe can’t control it, but we can evolve our thinking, our philosophy, our program and our architecture.” We can’t fall into old habits and try to Read More 19 Jul 2022News.Titus Understanding and Protecting CUIHelpSystems Webmaster · Thursday, July 14th, 2022 The ever-increasing ability to share information is a double-edged sword. On the one Read More 19 Jul 2022BeyondTrust.News AWS Root vs IAM User: What to Know & When to Use Them | BeyondTrustIn Amazon Web Services (AWS), there are two different privileged accounts. One is defined as Root User (Account owner) and the other is defined Read More 19 Jul 2022News.Qualys July 2022 Patch Tuesday | Microsoft Releases 84 Vulnerabilities with 4 Critical, plus 2 Microsoft Edge (Chromium-Based); Adobe Releases 4 Advisories, 27 Vulnerabilities with 18 Critical.Microsoft has fixed 84 vulnerabilities (aka flaws) in the July 2022 update, including four (4) vulnerabilities classified as Critical as they Read More 18 Jul 2022News.Riverbed Digital Experience Innovation & AccelerationIT für eine erfolgreiche Digitalisierung und Cloud-Migration modernisieren Um von digitalen und cloudbasierten transformativen Technologien zu Read More 17 Jul 2022News.ThreatQuotient The Pendulum Effect and Security AutomationThe last few years have been filled with examples of the “Pendulum Effect”, where trends swing from one extreme to another before Read More 16 Jul 2022Forcepoint.News Forcepoint Classification powered by Getvisibility combines AI-enhanced classification with award-winning DLPApplying AI for accuracy, automation and efficiency While many competing data classification solutions make limited use of machine learning, they Read More 12 Jul 2022Forcepoint.Gartner.News Reflecting on (One of) Gartner’s Cybersecurity PredictionsOne of the stand outs across the eight predictions: Late last month, Gartner released its top eight cybersecurity predictions for 2022-23, Read More 12 Jul 2022BeyondTrust.News Top 15 Password Management Best Practices | BeyondTrustThis blog has been updated with new data and insights since it was originally published on August 2, 2019. Think passwords will soon be dead? Read More 12 Jul 2022News.Qualys About CMDB Sync Integration with Qualys CyberSecurity Asset ManagementWelcome to the first in a new series of blog posts about Qualys integrations. This first blog in the series covers our integrations as they Read More 10 Jul 2022News.Press releases.ThreatQuotient The Meaning of OrchestrationThe Meaning of Orchestration Vicki Lemay Recently, ThreatQuotient hosted an interactive discussion regarding security orchestration and cyber Read More 9 Jul 2022Forcepoint.News ZTNA is key to securing the hybrid workforceSo why does all this matter? It’s important because many Zero Trust security strategies don’t fully address how the full range of users interact Read More 5 Jul 2022BeyondTrust.News Introduction from BeyondTrust’s New CEO: Janine Seebeck | BeyondTrustToday is an exciting day for me personally and for BeyondTrust, as I officially assume the role of CEO. After six years in leadership roles at Read More 5 Jul 2022News.Qualys Atlassian Confluence OGNL Injection Remote Code Execution (RCE) Vulnerability (CVE-2022-26134)On June 02, 2022, Atlassian published a security advisory about a critical severity Unauthenticated Remote Code Execution vulnerability affecting Read More 3 Jul 2022News.Press releases.ThreatQuotient.Webinars The Current State of Intelligent Automation Adoption in CybersecurityThe Current State of Intelligent Automation Adoption in Cybersecurity Cyrille Badeau In the past year, research indicates that nearly a third of Read More 3 Jul 2022News.Riverbed Digital Experience Innovation & AccelerationIT für eine erfolgreiche Digitalisierung und Cloud-Migration modernisieren Um von digitalen und cloudbasierten transformativen Technologien zu Read More 2 Jul 2022Forcepoint.News Insider Risk and the Great Resignation: Preventing Critical Data Loss When Employees LeaveHere are some sobering facts about the risks of departing employees: The ex-Pfizer employee is one of tens of millions of people around the world Read More 30 Jun 2022Educate yourself about Cybersecurity.News.Skyhigh Security.Vendors What Is Security Service Edge (SSE)?Read More 29 Jun 2022Educate yourself about Cybersecurity.News.Trellix.Vendors What Is Extended Detection and Response (XDR)?Read More 28 Jun 2022BeyondTrust.News The Dark Side of Microsoft WindowsThere is no denying that Microsoft Windows has a clear market advantage when it comes to their IT ecosystems. No other vendor has produced a Read More 28 Jun 2022News.Qualys Risk-based Remediation Powered by Patch Management in Qualys VMDR 2.0According to the recently released Verizon DBIR report, vulnerability exploitation continued to be one of the top three attack vectors exploited Read More 26 Jun 2022News.ThreatQuotient Security Orchestration: Beware of the Hidden Financial CostsAmong the many improvements in cybersecurity technology and tools we’ve seen over the last few years, one of the most significant has been Read More 25 Jun 2022Forcepoint.News The Next Generation of CDR TechnologyIntroducing the Next Generation of CDR! Not any more… Zero trust + CDR = Zero Trust CDR. Zero Trust CDR mitigates the threat of even the Read More 23 Jun 2022News.REAL.RISK conference Zaključena mednarodna konferenca RISK 2022Read More 23 Jun 202223 Jun 2022News.RISK conference Review of another successful RISK conferenceRead More 21 Jun 2022News.Titus Data Classification in the Finance WorldHelpSystems Webmaster · Monday, June 20th, 2022 When it comes to data privacy, financial services is one of the most highly regulated Read More 21 Jun 2022BeyondTrust.News Unix/Linux Privilege Management: Should You Sudo? Here’s What It Does and Why It’s Not Enough | BeyondTrustIn this blog, I will introduce you to sudo and su, two of the most important and most often used commands in Linux, and talk about the basic pros Read More 21 Jun 2022News.Qualys Defending Against Scheduled Task Attacks in Windows EnvironmentsScheduling tasks is one of the most popular attack techniques used by threat actors to establish persistence on a victim’s machine. The Qualys Read More 19 Jun 2022News.ThreatMark Automated phishing site takedown with Namecheap and ThreatMark API integrationPhishing is the scourge of the modern digital era. Verizon’s Data Breach Investigations Report notes that over 82% of data breaches include the Read More 19 Jun 2022News.ThreatQuotient ThreatQuotient Recognized as a 2022 Top Place to Work by The Washington PostProvider of security operations solutions stands out for excellent workplace culture that has contributed to industry recognition for the Read More 18 Jun 2022Forcepoint.News The Million-Dollar Question in 2022In a world where you can work from anywhere (and everyone knows it!), what keeps a person where they are or intrigues them to look Read More 14 Jun 2022BeyondTrust.News Windows Follina Vulnerability MitigationOn May 27th 2022, a new zero-day remote code execution (RCE) vulnerability (CVE-2022-30190P) was discovered in the Microsoft Support Diagnostic Read More 14 Jun 2022News.Qualys Close the Gap Between IT & Security with Our New App: Qualys VMDR for ITSMIn recent years, the world has seen an alarming rise in cyber-attacks. According to the just released Verizon DBIR report, the rate of increase Read More 12 Jun 2022News.Press releases.ThreatQuotient Reduce Time Or Do Not, There Is No ShiftReduce Time Or Do Not, There Is No Shift Dave Krasik In previous blog posts we’ve discussed the value of a data-driven approach to security Read More 11 Jun 2022Forcepoint.News.Webinars Webinar: Don’t Miss The Quickest Proof of Concept Ever! Zero Trust CDR vs MalwareThe technology is so quick and effective, that it takes us as little as 10 minutes to show you how it works. Don’t believe us? Join Aaron Read More 7 Jun 2022Forcepoint.News Are you SURE your security platform is helping your business?In short, most security products focus on “what” they’re doing rather than what they’re doing for you. That’s backwards. Nobody deploys security Read More 7 Jun 2022BeyondTrust.News BeyondTrust and the NASCIO 2022 Midyear ConferenceLast month saw the successful completion of the NASCIO 2022 Midyear Conference, which provides an opportunity for CIOs, top IT officials, and Read More 7 Jun 2022News.Qualys Introducing Qualys VMDR 2.0Over the last five years, the number of vulnerabilities disclosed has doubled. The speed at which vulnerabilities are weaponized and leveraged Read More 5 Jun 2022News.ThreatQuotient Automation. Where do We Go from Here?What’s next in the evolution of security automation and orchestration? Over the past 20 years we’ve seen significant improvements in Read More 4 Jun 2022Forcepoint.Gartner.News Catch Up with Forcepoint at RSAC 2022Hear from our CEO and our Global CTO On June 8, 11:10am PT, come watch a keynote session with our CEO, Manny Rivelo, on Security’s Dirty Little Read More 31 May 2022Forcepoint.News Defeating a brand new Microsoft Office zero-day attack with ZT CDRInitially, at the time of writing, only five of sixty vendors available marked this file, now known as CVE-2022-30190, as malicious. And as of Read More 31 May 2022BeyondTrust.News Cybersecurity Requirements: How Define Them & Map to the Right ProductWe’ve probably all heard what’s important when buying a house, “Location, Location, Location”, but what’s most important when buying a Read More 31 May 2022News.Qualys Qualys FIM: Be Compliance Ready with Intuitive, Ready-to-Use File Monitoring ProfilesRequirements for file-level security are often set by laws, regulations, and audit standards. These include identification of what must be Read More 29 May 2022News.Press releases.ThreatQuotient Taking a Data-Driven Approach to SOC OperationsTaking a Data-Driven Approach to SOC Operations LEON WARD Today’s escalating threat landscape means that security operations teams face a Read More 29 May 2022News.Press releases.ThreatQuotient Taking a Data-Driven Approach to SOC OperationsTaking a Data-Driven Approach to SOC Operations LEON WARD Today’s escalating threat landscape means that security operations teams face a Read More 24 May 2022Forcepoint.News.Webinars Successfully Migrating to an SSE PlatformWhile it’s fair to say migrating to a new, unified security SSE platform requires a bit of planning, it’s clear that a successful implementation Read More 24 May 2022BeyondTrust.News What is an Open Port & What are the Security Implications? | BeyondTrustWhat are ports? A port is a software-defined value that identifies a network endpoint. Any connection made on a TCP/IP network has a source and Read More 24 May 2022News.Qualys Put SecOps in the Driver’s Seat with Custom Assessment and RemediationWhen zero-day threats emerge, time is of the essence. Security teams struggle to manage and respond to a range of challenges that often require Read More 21 May 2022Forcepoint.News Cyber Threat Fatigue: A To The Point Cybersecurity Podcast RecapFor security practitioners feeling overwhelmed by the growing threat landscape, these episodes offer a shortcut to prioritizing some of the most Read More 19 May 202219 May 2022Logrhythm.Vendors LogRhythm Partners with REAL security to Enable Enterprises in the Adriatic Region to Detect and Respond to CyberthreatsRead More 17 May 2022News.Titus Data Classification: The Impact on a Zero Trust FrameworkHelpSystems Webmaster · Thursday, May 12th, 2022 At first glance, it appears that data classification and Zero Trust, a cybersecurity Read More 17 May 2022BeyondTrust.News What is IT Support? Technical Support Tools and Service Desk Explained3. Lack of training This challenge has two parts to it. First, there is a lack of end-user training that creates more demand on the IT Read More 17 May 2022News.Qualys How to Get Useful Monitoring of File-level SecurityFile integrity monitoring (FIM) tools are essential for defending business and customer data, but legacy tools are falling short by swamping Read More 15 May 2022News.Press releases.ThreatQuotient ThreatQuotient France : Christophe Varin est nommé au poste de Regional Sales ManagerParis le 12 mai 2022, ThreatQuotient™, pionnier sur le marché du renseignement sur la menace et des plateformes Read More 14 May 2022Forcepoint.Gartner.News What Do Customers Say About Forcepoint Secure SD-WAN?Forcepoint Secure SD-WAN In fact, Gartner analysts believe that by 2025, four out of every five companies will have a strategy in place to unify Read More 10 May 2022Forcepoint.News An Analysis of Dangerous CurvesIn a more idealized world, software that supports ECC in certificates would mandate the use of configurations that are known to be safe, and Read More 10 May 2022News.Qualys Ursnif Malware Banks on News Events for Phishing AttacksUrsnif (aka Gozi, Dreambot, ISFB) is one of the most widespread banking trojans. It has been observed evolving over the past few years. Ursnif Read More 8 May 2022News.Press releases.ThreatQuotient.Webinars Achieving Better Business Outcomes Through a CTI PracticeAchieving Better Business Outcomes Through a CTI Practice AMY DONOVAN According to Joshua Ray, managing director, Global Cyber Defense Lead, Read More 7 May 2022Forcepoint.News.Webinars Forcepoint and IDC Webinar: Data Loss Prevention – Top Trends of 2022Manual and arcane classification techniques are being replaced by machine learning and automation. The past 24 months have seen a renaissance in Read More 3 May 2022BeyondTrust.News.Webinars Zero Trust and Passwordless Authentication | BeyondTrustCybersecurity is not an industry that is synonymous with fashion. We have never had an iPhone moment before; that point when a smart, sparkly new Read More 2 May 2022News.PROFITAP Profitap IOTA v2.3.0 Release NotesThe newly released IOTA software version 2.3.0 includes the following new features: Added VoIP support to traffic flow analysis and Read More 1 May 2022News.Press releases.ThreatQuotient XDR best of breed, and how an open architecture will get you thereXDR best of breed, and how an open architecture will get you there ED YOUNG The security landscape is continually changing and the race to stay Read More 30 Apr 2022Forcepoint.News.Webinars Forcepoint Brings Personalized Automation at Scale to DLPMay 4 Webinar Today Forcepoint is delivering greater personalization and automation to DLP policy enforcement while also directly addressing the Read More 26 Apr 2022Forcepoint.News SWG: The Third Key Component of an SSE PlatformAs part of the Forcepoint ONE SSE platform, our SWG can use the same advanced threat protection and data security technologies that our Cloud Read More 26 Apr 2022BeyondTrust.News Applying Access Control Lists in the CloudWhat is an Access Control List? An Access Control List (ACL) provides a security mechanism to define who or what has access to your assets, Read More 26 Apr 2022News.Qualys Assessing Certificate Risk with Qualys VMDRDigital certificates and SSL are everywhere. However, managing an accurate inventory of all current certificates in use across your enterprise is Read More 24 Apr 2022News.ThreatQuotient When Attacks Surge, Turn to Data to Strengthen Detection and ResponseNews of cyber criminals and nation-state actors capitalizing on events, planned or unplanned, for financial gain or to wreak havoc have dominated Read More 19 Apr 2022BeyondTrust.News The Axeda Vulnerability and Lessons Learned | BeyondTrustIn March, a vulnerability that impacts Parametric Technology Corporation’s (PTC) Axeda agent and Axeda Desktop Server was announced. The Read More 19 Apr 2022News.Qualys April 2022 Patch Tuesday: Microsoft Releases 145 Vulnerabilities with 10 Critical; Adobe Releases 4 Advisories, 78 Vulnerabilities with 51 Critical.Microsoft Patch Tuesday Summary Microsoft has fixed 145 vulnerabilities, including 17 Microsoft Edge vulnerabilities, in the April 2022 update, Read More 17 Apr 2022News.Press releases.ThreatQuotient The role of Threat Intelligence Platforms in Implementing Extended Detection and ResponseThe role of Threat Intelligence Platforms in Implementing Extended Detection and Response GIGI SCHUMM As the new year continues to unfold, Read More 16 Apr 2022Forcepoint.News SSE Platforms are Bringing ZTNA to the MainstreamWith ZTNA, users no longer have to remember when to start their VPN—and wrestle with restarting it when it fails. And, by not having a VPN that Read More 15 Apr 2022Micro Focus.News Recapping Run and TransformThe exciting Micro Focus Universe 2022 conference showcased Micro Focus’ Run and Transform narrative. Derek Britton reflects on what… Read More 13 Apr 202213 Apr 2022News.Skyhigh Security.Tech Best Practices 2022 Gartner® Magic Quadrant™ Leader for Security Service EdgeRead More 13 Apr 202213 Apr 2022Skyhigh Security.What's new in ITSec world McAfee Enterprise SSE business relaunched as Skyhigh SecurityRead More 12 Apr 2022News.Titus What is India’s Personal Data Protection Bill?The EU’s GDPR paved the way for data privacy and protection laws around the world, and one of the latest is the emerging Personal Data Protection Read More 12 Apr 202213 Apr 2022News.Skyhigh Security.What's new in ITSec world The Forrester Wave™: Cloud Workload Security, Q1 2022Read More 12 Apr 2022BeyondTrust.News What is Vendor Privileged Access Management (VPAM)?Securing Vendor Identities & Access Vendor Privileged Access Management (VPAM) enables vendor identities to securely access an organization’s Read More 10 Apr 2022News.Press releases.ThreatQuotient Tax Season Scams Are Here Again – How to Mitigate RiskTax Season Scams Are Here Again – How to Mitigate Risk AARON LOUKS Ransomware has dominated the headlines the last couple of years. But it Read More 9 Apr 2022Forcepoint.News How Three Forcepoint Customers Use DLP for a Competitive AdvantageBut securing it from insider threats and external attacks isn’t easy. Information comes in all shapes and sizes, it’s stored far and wide, and it Read More 5 Apr 2022Forcepoint.Gartner.News SSE Platforms are Taking CASB to the Next LevelTake, for example, the Cloud Access Security Broker (CASB) capabilities within Forcepoint ONE. Drawing on technology that was a 3-time leader in Read More 5 Apr 2022BeyondTrust.News.Webinars How to Prepare for 2022 Cyber Insurance Renewals and What to Expect | BeyondTrustCyber insurance premiums in 2021 continued to climb to record highs, spurned by a significant spike in successful cyberattacks. According to the Read More 5 Apr 2022News.Qualys EDR Is Dead. Long Live Multi-Vector EDR.News of EDR’s demise has been greatly exaggerated. Fact is: older approaches to EDR have to move over. There’s a new solution now: Multi-Vector Read More 3 Apr 2022News.ThreatQuotient The Importance of Open Source to an XDR ArchitectureNo longer satisfied with infecting files or systems, adversaries are now intent on crippling entire enterprises. Damaging supply chain, Read More 2 Apr 2022Forcepoint.News Apple and Meta targeted with forged legal data requests, Triton malware still targeting energy firms, Hackers use MFA tool against Indian government, FBI warns election officials of phishing attacks, Kaspersky poses national security risk, moreApple and Meta reportedly provided customer data to hackers in response to forged ’emergency data requests.’ Triton malware still Read More 2 Apr 2022News.PROFITAP X2-Series v0.10.0 Release NotesThe newly released X2-Series software version 0.10.0 includes the following: PTPv2 Time Synchronization for Nanosecond Traffic Timestamping MPLS Read More 29 Mar 2022News.Titus Dark Data: Out of Sight, Out of MindElizabeth Swabey-Keith · Wednesday, March 23rd, 2022 Businesses are creating and collecting more data than ever. Far too much of this Read More 29 Mar 2022BeyondTrust.News Marc Maiffret’s ModernCTO Conversation: An FBI Raid, Free Mountain Dew, & Security Culture | BeyondTrustMarc Maiffret, CTO of BeyondTrust, recently sat down with Joel Beasley, the author of ModernCTO and host of the ModernCTO podcast, to discuss Read More 29 Mar 2022News.Qualys Implications of Windows Subsystem for Linux for Adversaries & Defenders (Part 1)This post is the first of a multi-part blog series that will explore and highlight the different risks that Windows Subsystem for Linux (WSL) Read More 27 Mar 2022News.ThreatQuotient Women in cybersecurity careers: 3 strategies to boost gender inclusionReston, Virginia-based ThreatQuotient’s Gigi Schumm makes the case for promotion transparency and bias awareness. The business case for Read More 26 Mar 2022Forcepoint.News Forcepoint ONE Demo Series – ZTNA for private web apps use casesForcepoint ONE On-Demand Demo Watch the Webcast To bring this to life, Shane Moore demonstrates how easy it is to use the ZTNA for both end users Read More 22 Mar 2022BeyondTrust.News Azure AD Security Best Practices Explored | BeyondTrustOf course, it’s a cloud-based product, SaaS-based product, that fully audits itself. Does this idea of continuous discovery. So just like Read More 22 Mar 2022News.Qualys Infographic: Log4Shell Vulnerability Impact by the NumbersThe full scope of risk presented by the Log4Shell vulnerability is something unprecedented, spanning every type of organization across every Read More 20 Mar 2022News.Press releases.ThreatQuotient Women in Cybersecurity – Lavanya RajWomen in Cybersecurity PROFILE – LAVANYA RAJ Lavanya RajThreatQuotient – Senior QA Engineer What do you do at ThreatQuotient?I Read More 19 Mar 2022Forcepoint.News Forcepoint ONE Demo Series – SWG Use CaseKey features demonstrated: To bring these use cases to life, Shane Moore demonstrates how easy it is to use the Forcepoint ONE SWG for both end Read More 19 Mar 2022Certgate AirID FIDO – New wireless, secure Passwordless AuthenticationNew AirID FIDO security key enables wireless, Passwordless Authentication for PC, tablet and online services for the first time. MICROSOFT, OKTA, Read More 18 Mar 2022News.Riverbed Hybrid Work Global Survey 2021 | Riverbed | AternityHybrid work is the new norm and critical to organizational success—but the question is, are you ready to support the hybrid workplace? To assess Read More 15 Mar 2022Forcepoint.News Securing collaboration in a multi-cloud Zero Trust environmentSecurity and IT teams still remain challenged: How can I safely enable an internal application for a remote individual? How can I safely Read More 15 Mar 2022BeyondTrust.News Turbocharging your IT Service DeskIncrease Productivity, While Building a Foundation for More Automation and Innovation The demands on IT Service Management (ITSM) have never been Read More 15 Mar 2022News.Qualys Casdoor SQL Injection (CVE-2022-24124)On Jan 22, 2022, a high severity SQL Injection vulnerability was reported in Casdoor which affected versions before 1.13.1 release. The Read More 13 Mar 2022News.Press releases.ThreatQuotient Women in Cybersecurity – Gianna Whitver & Maria VelasquezWomen in Cybersecurity PROFILE – GIANNA WHITVER & MARIA VELASQUEZ Gianna Whitver & Maria VelasquezCybersecurity Marketing Read More 12 Mar 2022Forcepoint.News Forcepoint ONE Demo Series – CASB Use CaseTo bring this point to life, Forcepoint Vice President of Sales, SSE, Shane Moore, demonstrates how Forcepoint ONE is easy to use for both end Read More 8 Mar 2022Forcepoint.Gartner.News Elena Cerrada at IDC and IDG Cybersecurity Forum 2022At Forcepoint, we specifically address the aformentioned challenges by adhering to 2 strategic constructs. The first consists in simplifying Read More 8 Mar 2022BeyondTrust.News Recalibrating Your Data Security Model to Achieve Zero Trust for GoverThe Push to Zero Trust On May 12, 2021, President Joe Biden passed an executive order (EO) on cybersecurity requiring federal agencies migrate Read More 8 Mar 2022News.Qualys AvosLocker Ransomware Behavior Examined on Windows & LinuxAvosLocker is a ransomware group that was identified in 2021, specifically targeting Windows machines. Now a new variant of AvosLocker malware is Read More 6 Mar 2022News.Press releases.ThreatQuotient Women in Cybersecurity – Audrey LlorensWomen in Cybersecurity PROFILE – AUDREY LLORENS Audrey LlorensThreatQuotient – Senior Manager, International Marketing What do Read More 5 Mar 2022Forcepoint.Gartner.News SASE Security and the new Security Service Edge (SSE)What is SASE Security or SSE? Whether you call it SASE security or SSE, this unified approach to providing security as a service for people Read More 3 Mar 20223 Mar 2022Educate yourself about Cybersecurity.News.Webinars WEBINAR It’s NOT about SECURITY. It’s about RESILIENCY!Join us on CyberRes Webinar with Ramsés Gallego Strengthen Your Cyber Resilience on 15th of March 2022 From securing the industry value chain to Read More 3 Mar 2022News.Riverbed Determining If NetProfiler Is Oversubscribed | Riverbed BlogWhen your Riverbed NetProfiler is oversubscribed and out of capacity, it’s not providing a complete view of your network performance. The view is Read More 2 Mar 2022News.PROFITAP X2-Series v0.9.0 Release NotesThe newly released X2-Series software version 0.9.0 includes the following: Added support for Profitap Supervisor Authentication Improved Traffic Read More 1 Mar 2022News.Titus The Importance of Automation in Data ClassificationElizabeth Swabey-Keith · Wednesday, February 23rd, 2022 It’s no surprise to anyone that the amount of data that exists is rapidly Read More 1 Mar 2022Forcepoint.News Your Mission is Our Mission – Shields Up— Former U.S. CISA Director Christopher Krebs Worldwide government, defense industries, and critical infrastructure organizations are seeking to Read More 1 Mar 2022BeyondTrust.News Cybersecurity Preparedness in Face of Global Conflict | BeyondTrustThe invasion of Ukraine is a harrowing ordeal for anyone impacted by the conflict. While we hope the situation can be resolved without further Read More 1 Mar 2022News.Qualys Russia-Ukraine Crisis: How to Strengthen Your Security Posture to Protect against Cyber Attack, based on CISA GuidelinesCISA has created Shields-Up as a response to the Russian invasion of Ukraine. Qualys is responding with additional security, monitoring and Read More 28 Feb 202228 Feb 2022Case study.Forcepoint.News Do you enjoy a good cup of coffee from your espresso machine? Without Forcepoint that might be harder for some people – check out why!A Top Espresso Machine Maker Manages Firewalls Around the World Simply and Cost-Effectively with Forcepoint To ensure secure and affordable Read More 28 Feb 2022Educate yourself about Cybersecurity.News.RISK conference We’re on – RISK 2022 registrations are now open!Good old times, we are coming! We are eagerly awaiting the 1st and 2nd of June, when we will finally after 2 years have a privilege to host YOU Read More 28 Feb 202228 Feb 2022Extrahop.News.Tech Best Practices Build Resilience Amid Rising Risk of Russian CyberthreatsThe predicted invasion of Ukraine by Russian forces has begun, and with it, the risk of cyber warfare against Ukraine’s supporters has Read More 28 Feb 202228 Feb 2022Good to know.News.Radware Radware DDOS Emergency On-BoardingIn some Adriatic countries, customers start to see more threat activities including DDoS focused on banks and GOV organizations. We are proposing Read More 27 Feb 2022News.Press releases.ThreatQuotient 3 Steps Security Leaders Can Take Toward Closing the Skills GapMuch has been written about the Great Resignation as its impact is widespread. Sectors including hospitality, food, retail, Read More 26 Feb 2022Forcepoint.News Forcepoint ONE – Built on a Scalable Zero Trust FoundationComplexity is the main reason. But scalability and performance are also concerns for many. That’s why we’re excited to bring Forcepoint ONE to Read More 22 Feb 2022News.Titus Key Considerations in The Ever-Evolving Data Privacy Landscape – The Benefit of Layered SecurityHome » Titus Blog » Key Considerations in The Ever-Evolving Data Privacy Landscape – The Benefit of Layered Security HelpSystems Webmaster Read More 22 Feb 2022BeyondTrust.News An Analyst’s Take: The Essential 8 & Using Zero Trust to Avoid Compliance-as-a-Strategy | BeyondTrustIt’s old news now – the pandemic spurred a “quantum leap” in digital transformation. Yet, the fact remains, security has yet to catch up. Read More 22 Feb 2022News.Qualys Oh Snap! More Lemmings: Local Privilege Escalation Vulnerability Discovered in snap-confine (CVE-2021-44731)The Qualys Research Team has discovered multiple vulnerabilities in the snap-confine function on Linux operating systems, the most important of Read More 21 Feb 2022Gartner.McAfee.News.Webinars McAfee Enterprise SSE: Named a Leader In 2022 Gartner Magic Quadrant for SSERecognizing the significant role SSE is filling in cybersecurity, Gartner® has published its first ever Magic Quadrant report for SSE. We are Read More 20 Feb 2022Gartner.News.Press releases.ThreatQuotient.Webinars Combat Advanced Threats with a Multi-disciplinary Threat Intelligence ProgramCombat Advanced Threats with a Multi-disciplinary Threat Intelligence Program ALISON ADKINS Ransomware attacks on Colonial Pipeline, JBS Foods Read More 19 Feb 2022Forcepoint.Gartner.News Forcepoint (Bitglass) recognized by Gartner® as a Visionary in first-ever Magic Quadrant™ for Security Service Edge (SSE)Our SSE solution brings together the cloud-native platform developed by Bitglass (which joined the Forcepoint family in October 2021) with our Read More 15 Feb 2022News.Titus Key Considerations in The Ever-Evolving Data Privacy Landscape – The Biggest Risk to Your OrganizationHome » Titus Blog » Key Considerations in The Ever-Evolving Data Privacy Landscape – The Biggest Risk to Your Organization HelpSystems Webmaster Read More 15 Feb 2022Forcepoint.News An Analysis of Software Supply Chain AttacksIntentional Software Flaws?Security has always been about making sure what shouldn’t happen doesn’t happen. It means proving that something bad Read More 15 Feb 2022BeyondTrust.News KuppingerCole Review of Cloud Privilege Broker – A CIEM SolutionRecently, analyst research firm KuppingerCole released their Executive Review: Cloud Privilege Broker report, exploring BeyondTrust’s debut into Read More 15 Feb 2022News.Qualys Microsoft & Adobe Patch Tuesday (February 2022) – Microsoft 70 Vulnerabilities with 0 Critical; Adobe 17 Vulnerabilities with 5 CriticalMicrosoft Patch Tuesday – February 2022 Microsoft addresses 70 vulnerabilities in their February 2022 Patch Tuesday release. While none of the Read More 13 Feb 2022News.ThreatQuotient Chris Jacob, ThreatQuotient: organizations must automate their security systems to mitigate escalating cyber threatsEven though protecting against malicious threat actors is equally important for both regular users and businesses, corporations are even more Read More 12 Feb 2022Forcepoint.News The DOJ Recovers Bitcoin Worth $3.6 Billion, SIM Swap Attacks Rise, Antlion Attacks Taiwanese Businesses, Backdoor Trojan Attacks macOS VulnerabilityEarlier this week, the Justice Department seized more than $3.6 billion in bitcoin that was believed to be stolen as part of the 2016 hack of the Read More 11 Feb 2022Micro Focus.News It’s (always) time to changeHistory gives us plenty of reminders of the dangers of not changing with the times. The market quickly forgets those who get left behind. Derek Read More 8 Feb 2022News.Qualys Managing CISA Known Exploited Vulnerabilities with Qualys VMDRCISA recently released a directive recommending urgent and prioritized remediation of actively exploited vulnerabilities. Both government Read More 6 Feb 2022Gartner.News.ThreatQuotient Ingecom alcanza un acuerdo de distribución con ThreatQuotientEl fabricante es el primer proveedor de plataformas de inteligencia contra amenazas (TIP) que ofrece servicios directamente desde España. Read More 5 Feb 2022Forcepoint.News.Webinars The Secret of DLP Migration? It Doesn’t Have to HurtToo often, I talk to customers who had been settling previously for a sub-optimal, legacy DLP solution because they feared the migration process Read More 2 Feb 2022News.PROFITAP Profitap IOTA v2.2.2 Release NotesThe newly released IOTA software version 2.2.2 includes the following new features:Read More 1 Feb 2022Forcepoint.News Why Data Protection Regulations Require a Watching BriefAlexandra: In this discussion around the challenges facing international businesses who want to protect critical data and remain compliant, Read More 1 Feb 20221 Feb 2022FireEye.McAfee.News.Trellix.What's new in ITSec world Two trusted leaders in cybersecurity McAfee Enterprise & FireEye, Inc. have come together as Trellix to create a resilient digital world.Symphony Technology Group Announces the Launch of Extended Detection and Response Provider, Trellix SAN JOSE, Calif., January 19, 2022—(BUSINESS Read More 1 Feb 2022BeyondTrust.News Elasticsearch is Here!Introducing Privilege Management for Unix & Linux (PMUL) and Active Directory Bridge (AD Bridge) v22.1 The release of Privilege Management Read More 1 Feb 2022News.Qualys Simplifying Cloud Asset Identification in a Multi-Cloud EnvironmentEnterprises struggle to get an accurate asset inventory in multi-cloud or hybrid cloud environments. Qualys enhances the metadata for cloud Read More 31 Jan 20221 Feb 2022Educate yourself about Cybersecurity.McAfee.News What Is a CASB?A Cloud access security broker, or CASB, is cloud-hosted software or on-premises software or hardware that act as an intermediary between users Read More 31 Jan 20221 Feb 2022Case study.News Efficiency of GoAnywhere MFTPremier Children’s Hospital Finds Batch File Processing Easier with GoAnywhere MFT Industry: Healthcare A leading children’s hospital and go-to Read More 31 Jan 20221 Feb 2022Netwrix.News.Tech Best Practices Top 5 Azure AD Security Best PracticesAzure Active Directory holds the keys to your Microsoft 365 kingdom. Responsible for vital functions such as authentication and authorization, Read More 31 Jan 20222 Feb 2022BeyondTrust.Good to know.News Cybersecurity Survival Guide 2022 EditionMany of the workplace changes accelerated by the pandemic are expected to endure, and a more durable hybrid work environment is taking root. The Read More 30 Jan 2022News.Niagara Networks Empowering data privacy with the right network visibility solutionIn the digital transformation age, the cybersecurity industry received tremendous spotlight with respect to the pervasive capability of the IT Read More 30 Jan 2022News.ThreatQuotient How Threat Intelligence Can Help Businesses Respond To CyberthreatsExpert Insights speaks to Chris Jacob, Vice President of Threat Intelligence Engineering at ThreatQuotient, to discover how organizations can Read More 29 Jan 2022Forcepoint.News Cryptocurrency News: Building in Resiliency and International Co-OperationTurning to cybersecurity news within cryptocurrencies this month, Crypto.com admitted that login issues that had plagued users turned out to be a Read More 25 Jan 2022Forcepoint.News The Dynamic Dozen: Our Favorite Episodes of To The Point Cybersecurity Podcast in 2021Plenty of people are talking about cyberattacks, but fewer are talking about cyber cartels. For this episode, we sat down with Tom Kellerman, the Read More 25 Jan 2022BeyondTrust.News Australian Security Leaders Assess Impact of Amendments to Security of Critical Infrastructure Bill | BeyondTrustThe global events of 2021 again made it difficult to plan and execute most face-to-face gatherings as a security and technology community. Read More 23 Jan 2022News.Press releases.ThreatQuotient Power the SOC of the Future with the DataLinq Engine – Part 3Power the SOC of the Future with the DataLinq Engine – Part 3 LEON WARD In my first blog in this three-part series, we discussed the Read More 22 Jan 2022Forcepoint.News VPNLab[.]net Service Shutdown, Aftermath of Kronos Attack, Public Sector Ransomware Attacks in 2021, Data-wiping Software Targets Ukraine, APT35 Uses PowerShell Log4j BackdoorLaw enforcement agencies across 10 nations, including the FBI shut down a 15-server VPN operation used by cybercriminals to anonymize ransomware Read More 18 Jan 202219 Jan 2022News.Trellix Symphony Technology Group Announces the Launch of Extended Detection and Response Provider, TrellixSAN JOSE, Calif., January 19, 2022—(BUSINESS WIRE)— Symphony Technology Group (STG) announced today the launch of Trellix, a new business Read More 18 Jan 2022News.Qualys The Chaos Ransomware Can Be RavagingThe Qualys Research Team has observed a new version of Chaos ransomware in development. This blog reviews the malware’s updated functionality as Read More 18 Jan 2022News.Riverbed Hybrid Work Global Survey 2021 | Riverbed | AternityHybrid work is the new norm and critical to organizational success—but the question is, are you ready to support the hybrid workplace? To assess Read More 16 Jan 2022News.Niagara Networks.Webinars Modern DDoS defenses for National Networks – combining network visibility in Design and ImplementationDistributed Denial-of-service (DDoS) attacks continue to accelerate and evolve into highly sophisticated vectors, threatening any digitally Read More 16 Jan 2022News.ThreatQuotient The coming reckoning: Showing ROI from threat intelligenceThreat intelligence has been a part of cyber defense processes in the private sector for nearly a decade now. Many threat intelligence teams Read More 15 Jan 2022Forcepoint.News Protecting the Most Dangerous Door to Data LossEmail is the most popular threat vector for attackers to use for delivering malware to an organization. Email is also a direct line of contact Read More 11 Jan 2022Forcepoint.News Why Cybersecurity Cannot Be Separated from National SecurityIn the episode, Alperovitch brings a particularly important perspective to the table as we think about threats like ransomware or supply chain Read More 11 Jan 2022BeyondTrust.News Essential Cybersecurity Survival Strategies for 2022 & Beyond (New Guide!) | BeyondTrustIn cyberspace, there exists no safe harbor. Every organization with a digital presence is exposed like an island amidst an angry, implacable Read More 11 Jan 2022News.Qualys Emotet Re-emerges with Help from TrickBotEmotet has recently reemerged after being taken down less than a year ago by global law enforcement as coordinated by Europol and Eurojust. The Read More 10 Jan 2022Micro Focus.News Supporting Society’s Biggest Challenges: Our Year in ReviewThe year 2021 has been a significant one. Never before has the need to create a more sustainable, inclusive world been more relevant – as Read More 9 Jan 2022News.ThreatQuotient The Second Building Block for the SOC of the Future: An Open Integration FrameworkThe SOC of the future must be data driven, so it’s essential that systems and tools can work together As we turn the page on another year Read More 8 Jan 2022Forcepoint.News 2021 Malware Report: The Looming Ransomware ThreatWith high-profile malware and ransomware attacks capturing recent headlines, organizations have elevated this problem to a top priority,” said Read More 6 Jan 2022McAfee.News Technical Analysis of CVE-2021-1732The vulnerability, CVE-2021-1732, is a win32k window object type confusion leading to an OOB (out-of-bounds) write which can be used to create Read More 4 Jan 2022BeyondTrust.Gartner.News BeyondTrust Named a 2021 Gartner Peer Insights™ Customers’ ChoiceBeyondTrust is thrilled to share that we have been recognized as a ‘Customers’ Choice’ in the December 2021 Gartner Peer Insights ‘Voice of the Read More 4 Jan 2022News.Qualys Log4Shell – Follow This Multi-Layered Approach for Detection and RemediationSince the Log4Shell vulnerability was first discovered, Qualys has analyzed and responded to the threat in a systematic way approaching it from Read More 3 Jan 2022News.Riverbed Log4J Threat Hunting with NetProfiler and AppResponse | Riverbed|AternityA recently discovered vulnerability in the Java logging utility Log4J (CVE-2021-44228)1 enables remote code execution exploits in a variety of Read More 2 Jan 2022News.PROFITAP Log4j Security Notice Log4j Security Notice & IOTA v2.2.1 Concerning Log4j and Profitap: Potentially affected products Profitap IOTA (any version). Read More 28 Dec 2021News.Qualys How to Discover Log4Shell Vulnerabilities in Running Containers & ImagesIf you run Java applications in containers, then it is critical that you check for Log4Shell vulnerabilities, given the high severity of this Read More 27 Dec 2021Micro Focus.News Every Hero Needs a SidekickIn the rush towards digital transformation, even the heroic CIO needs someone they can turn to, says Derek Britton. Who is in your corner to help Read More 25 Dec 2021Forcepoint.News Cashing in on CryptoIf proof were needed, regulators in both the UK and USA have just published guidance on cryptocurrencies for banks and financial institutions. Read More 23 Dec 2021McAfee.News Threat Intelligence and Protections Update Log4Shell CVE-2021-44228CVE-2021-44228 – Apache Releases Log4j Version 2.15.0 to Address Critical RCE Vulnerability Under Exploitation. Threat Summary Read More 21 Dec 2021Forcepoint.News.Webinars Securing the Perimeter of Higher Education – A Fireside Chat with SUNY PlattsburghHigher education institutions of today must practice a delicate balancing act of delivering a high-quality, uninhibited student experience while Read More 21 Dec 2021BeyondTrust.News CVE-2021-44228 or “Log4Shell” is a remote code execution zero-day vulCVE-2021-44228 or “Log4Shell” is a remote code execution zero-day vulnerability in the Apache Log4j2 library, originally disclosed on Read More 21 Dec 2021News.Qualys Qualys Integrates with Shodan to Help Map the External Attack SurfaceQualys CyberSecurity Asset Management (CSAM) now natively integrates with Shodan to enable cybersecurity teams to identify all assets visible on Read More 19 Dec 2021News.Press releases.ThreatQuotient.Webinars Run out of Netflix options? Check out our Most Popular Webinars for 2021Run out of Netflix options? Check out our Most Popular Webinars for 2021 KASEY ELLO We’re fortunate to have a depth and breadth of Read More 18 Dec 2021Forcepoint.News Forcepoint Security News: Log4Shell Vulnerability, Pfizer Trade Secrets Exfiltration, Classifieds Site Leaked Personal Info via the F12 Key, and Hive Ransomware Enters Big LeagueThe recently discovered Log4Shell vulnerability in the popular open source Log4j logging software lets an attacker gain access to a vulnerable Read More 18 Dec 2021News.Riverbed Zoom, Teams, DNS and New TCP Analysis Extract Application and Network Intelligence | Riverbed|AternityWith the vast bulk of the world’s white-collar workforce working from home during the COVID-19 pandemic, there was an explosion in demand for Read More 17 Dec 2021Micro Focus.News Update on Micro Focus Response to “Log4j” VulnerabilityDecember 15, 2021 Updates: Micro Focus is taking immediate action regarding Common Vulnerabilities and Exposures CVE-2021-44228 and Read More 14 Dec 2021Forcepoint.News Cool Heads and Hot WalletsWhy is Cryptocurrency so hot? Rising inflation is devaluing cash reserves by the day, making crypto an ever more attractive investment Read More 14 Dec 2021BeyondTrust.Gartner.News.Webinars Managing Privileged Access across Multicloud IT Environments | BeyondTrustAdmin, superuser, root – different names for the same concept: an account that has total control over a system. In the Windows world, this Read More 14 Dec 2021News.Qualys Developing a Repeatable and Sustainable Security Exploitable Risk Reporting ProgramIntroduction The key to creating a practical Reporting Philosophy is/are well-written vulnerability management policies, standards, and Read More 13 Dec 2021McAfee.News Log4Shell Vulnerability is the Coal in our Stocking for 2021What is it? The vulnerability exists in the way the Java Naming and Directory Interface (JNDI) feature resolves variables. When a JNDI Read More 12 Dec 2021News.Press releases.ThreatQuotient The Threat Model as a CompassThe Threat Model as a Compass ANTHONY STITT The purpose of the Cyber Threat Intelligence (CTI) team is to understand the cyber threat environment Read More 11 Dec 2021Forcepoint.News.Webinars Product Spotlight—Bitglass Platform DLP December 14Because it’s built with familiar policy models, you won’t need to reinvent your approach and policies as you move to the cloud. Bitglass’ Read More 7 Dec 2021News.Titus Take the best-of-breed track to implementing data classificationDownload our infographic The post Take the best-of-breed track to implementing data classification appeared first on Titus. This post was first Read More 7 Dec 2021Forcepoint.News Dr. Andrew Hammond Talks Cyber Espionage, Spy Museum and MoreIndeed, the desire to know what an adversary is doing is hardly a new one. Instead, technology and the role of the intelligence agent have Read More 7 Dec 2021BeyondTrust.News BeyondTrust Launches Cloud Privilege Broker for Control Over Multicloud Permissions & Entitlements | BeyondTrustIt is my pleasure to announce the release of BeyondTrust Cloud Privilege Broker, a new solution built from the ground up to help our customers Read More 5 Dec 2021News.Press releases.ThreatQuotient.Webinars What Does Sun Tzu Have to Do with XDR? More Than You Might Think!What Does Sun Tzu Have to Do with XDR? More Than You Might Think! ANTHONY PERRIDGE Military general and philosopher Sun Tzu once led the largest Read More 4 Dec 2021Forcepoint.News Forcepoint Security News: GoDaddy Breach Widens, Panasonic Confirms Cyberattack, California Pizza Kitchen Serves Up Employee SSNs, and Political CyberattacksGoDaddy Breach Widens, Includes Reseller Subsidiaries Panasonic Confirms Cyberattack and Data Breach California Pizza Kitchen Serves Up Employee Read More 2 Dec 2021McAfee.News The Bug Report – November EditionCVE-2021-20322: Of all the words of mice and men, the saddest are, “it was DNS again.” Your Cybersecurity Comic Relief To Read More 30 Nov 2021Forcepoint.News Product Spotlights: Network Security Session Coming December 7All of these elements have opened a Pandora’s box. A Robert Half survey found that 49% of employees prefer a hybrid work arrangement that Read More 30 Nov 2021News.Qualys It’s a Wrap! QSC 2021 Las Vegas Laid Out Problems, Solutions and InnovationAlthough organizations have made moves toward it for years, digital transformation, in a way, has only just begun. The pandemic may have Read More 29 Nov 2021McAfee.News.Webinars McAfee Enterprise Defender Blog | CISA Alert: MS Exchange & Fortinet VulnerabilitiesThreat Summary On November 17, 2021, The US Cybersecurity & Infrastructure Security Agency (CISA) pushed an Alert entitled “Iranian Read More 28 Nov 2021News.Press releases.ThreatQuotient Integration of the ThreatQ platform into McAfee Enterprise infrastructureIntegration of the ThreatQ platform into McAfee Enterprise infrastructure EUTIMIO FERNANDEZ Proper management of threat data is critical in Read More 27 Nov 2021News.ThreatMark ThreatMark Recognized Top 5 in Deloitte’s 2021 Technology Fast 50 CEThreatMark, provider of the most advanced online fraud prevention solution in the market, has been recognized in the Top 5 Deloitte’s 2021 Read More 25 Nov 2021Gartner.McAfee.News Global Technology Provider Looks to MVISION Unified Cloud EdgeTo better serve its customers and secure its own environments, one global technology provider decided to expand its existing on-premises data Read More 23 Nov 2021BeyondTrust.News.Webinars Multicloud Security & Permissions Management: Practical Tips | BeyondTrustHere is a question to consider: How many cloud solutions does each organization need? If your organization wishes to remain competitive – the Read More 23 Nov 2021News.Qualys Euronet Worldwide: Speedy, Global Response to Threats Reduces RiskAfter years of using manual processes and systems to manage its IT inventory and track vulnerabilities, racking up costs, and increasing the Read More 22 Nov 2021McAfee.News Ransomware Threats Affecting the Public SectorIn June 2021 the G7 economies urged countries that may harbor criminal ransomware groups to take accountability for tracking them down and Read More 21 Nov 2021News.Niagara Networks Resolving the Packet Duplication ChallengesSeamless monitoring of network traffic is critically important for enterprise network and security administrators: it lies at the very foundation Read More 21 Nov 2021Gartner.News.ThreatQuotient Acronyms Aside, the SOC of the Future Needs These 3 CapabilitiesEvery discipline has its acronyms, but I’d venture to say cybersecurity has more than its share. We use them to describe threat actors and Read More 20 Nov 2021Forcepoint.News The Rise of Tractor Hackers and Smart City AttackersBy trying to remove the overhead of humans through automation, food producers and farmers have incidentally built their businesses on an Read More 18 Nov 2021Gartner.McAfee.News Qualities of a Highly Available CloudMVISION UCE, our data-centric, cloud-native Security Service Edge (SSE) security platform, derives its capabilities from McAfee Read More 16 Nov 2021Forcepoint.News SolarWinds CEO Talks Sunburst Attack, SecurityDon’t miss this insightful and inspiring discussion, part of Forcepoint’s To The Point podcast series named to FedTech’s Top 30 Federal IT Read More 16 Nov 2021BeyondTrust.News Proactive PAM Defenses against LightBasin (UNC1945) & other Advanced Attackers | BeyondTrustOn October 19, 2021, CrowdStrike released a detailed analysis of a cyberattack waged on telecommunications companies by a group dubbed LightBasin Read More 16 Nov 2021News.Qualys Microsoft & Adobe Patch Tuesday (November 2021) – Microsoft 55 Vulnerabilities with 6 Critical, 6 Zero-Days. Adobe 4 VulnerabilitiesMicrosoft Patch Tuesday – November 2021 Microsoft patched 55 vulnerabilities in their November 2021 Patch Tuesday release, of which six are rated Read More 15 Nov 2021McAfee.News Veterans Day & Remembrance Day 2021When were you drafted or when did you enlist/join? What branch of the military did you serve and in what rank? Shannon Clancy joined October 5, Read More 15 Nov 2021Micro Focus.News If We Really Want to Drive Change, We Have to Work TogetherThe final INSPIRE 20 podcast looks back at a number of the ways that individuals are promoting inclusion and diversity in their own lives and how Read More 14 Nov 2021News.Press releases.ThreatQuotient ThreatQuotient dévoile ThreatQ v5 : pour soutenir le SOC du futur avec des capacités clés de gestion des donnéesL’approche axée sur les données, l’architecture d’open intégration et l’automatisation Read More 13 Nov 2021Forcepoint.News Security News: U.S. Offers DarkSide Bounty, Nobelium Campaigns Continue, and International Ransomware AttacksU.S. Cracks Down on Ransomware, Offers $10 Million Bounty for DarkSide Info Nobelium, The Hackers Behind SolarWinds Attack, Targets IT Supply Read More 13 Nov 2021News.Opentext An open letter to anyone switching their supply chain integration servicesDear Reader, If you’re here then you are at least marginally associated with some aspect of your company’s Read More 11 Nov 202128 Feb 2022Group-IB.News.Webinars See Your Company Through The Eyes Of The HackerFew corporate breaches actually involve zero-day vulnerabilities or advanced exploits. Instead, those breaches result from ordinary Read More 11 Nov 2021McAfee.News Legendary Entertainment Relies on MVISION CNAPP Across Its Multicloud EnvironmentLegendary Entertainment is a global media company with multiple divisions including film, television, digital studios, and comics. Under the Read More 9 Nov 2021Forcepoint.News Security News: REvil Group Taken Offline by Feds, Attacker Activities and a VPN Company Exposes DataREvil Ransomware Gang Taken Offline (Again) by FBI DarkSide Moves to Cash Out $7m in Bitcoin Acer Confirms Second Cyberattack Within a Week of Read More 9 Nov 2021BeyondTrust.News SSD Advisory – macOS Finder RCE & How Privilege Management for Mac Can Mitigate It | BeyondTrustThe SSD Advisory in macOS Finder RCE, discovered last month by independent security researcher, Park Minchan, underscores the need for having Read More 9 Nov 2021News.Qualys CSPM Evolution – Start Secure, Stay SecureFor the last several years, the Verizon DBIR report has identified misconfigurations, errors that are unintended actions by an internal party, as Read More 7 Nov 2021News.Press releases.ThreatQuotient Cybersecurity Breakthrough Awards Names ThreatQuotient Security Automation Solution of the YearCybersecurity Breakthrough Awards Names ThreatQuotient Security Automation Solution of the Year MARC SOLOMON With thousands of tools and Read More 6 Nov 2021Forcepoint.News Beware the NetSec PretendersAt Forcepoint, that simply isn’t how we do business. We do security. But, if we’ve made such big strides forward, then how is it that cyber Read More 6 Nov 2021News.Opentext A staged approach to achieving clinical data intelligenceIn 1925, inventor Hugo Gernsbacher suggested a remote control device for physicians and called it ‘Teledactyl,’ effectively Read More 4 Nov 2021McAfee.News The Bug Report – October EditionApache server version 2.4.50 (CVE-2021-42013) Your Cyber Security Comic Relief Apache: CVE-2021-41773 and CVE-2021-42013 What is it? 2 CVES / 1 Read More 3 Nov 2021cPacket Networks.News cPacket Networks Extends Cloud Visibility with Microsoft Azure Gateway Load BalancerThe post cPacket Networks Extends Cloud Visibility with Microsoft Azure Gateway Load Balancer appeared first on cPacket Networks.Read More 3 Nov 2021News.Riverbed Hybrid Work Global Survey 2021 | Riverbed | AternityWe get it, hybrid work is important and here to stay. But shifting to a high-performing hybrid work model is challenging and elusive for most Read More 3 Nov 2021News.Riverbed Hybrid Work Global Survey 2021 | Riverbed | AternityHybrid work is the new norm and critical to organizational success—but the question is, are you ready to support the hybrid workplace? To assess Read More 3 Nov 2021Cofense.News Cofense General Counsel and Chief Privacy Officer Shane McGee to Speak At 2021 RSA ConferenceLeesburg, Va. – May 6, 2021 – Cofense, the leading provider of phishing detection and response (PDR) solutions, today announced that the Read More 2 Nov 2021News.Titus Why You Need A Specialist Provider – Getting The Product Support You Need Home » Titus Blog » Why You Need A Specialist Provider – Getting The Product Support You Need Georgina Stockley · Monday, November 1st, Read More 2 Nov 2021BeyondTrust.News 2021 Survey of Evolving Cyber Threats in the Public Sector: Key Takeaways | BeyondTrustPublic sector IT teams are leaning into digital transformation and increasing their reliance on automation (such as robotic processing Read More 2 Nov 2021News.PROFITAP Profitap Supervisor Release NotesWith network growth ever on the rise, it can become more and more difficult to implement, manage, and maintain monitoring equipment such as Read More 2 Nov 2021News.Qualys Apache HTTP Server Path Traversal & Remote Code Execution (CVE-2021-41773 & CVE-2021-42013)On October 4, 2021, Apache HTTP Server Project released Security advisory on a Path traversal and File disclosure vulnerability in Apache HTTP Read More 1 Nov 2021McAfee.News McAfee Enterprise & FireEye 2022 Threat PredictionsRansomware, nation states, social media and the shifting reliance on a remote workforce made headlines in 2021. Bad actors will learn from this Read More 1 Nov 2021Micro Focus.News Micro Focus Post-Sales: SupportedI am Dr. James D. Borderick, and I look after the Competitive Benchmark research for Micro Focus, which I have been doing for over five years. I Read More 31 Oct 2021News.ThreatQuotient 3 Questions for MDRs Helping to Get Your Enterprise to XDRAn XDR implementation can quickly turn into a very large consulting project requiring significant time and budget As cybersecurity professionals Read More 30 Oct 2021Forcepoint.News Cyberattacks: Now Part of the Military ArsenalWhile the U.S. has used cyber strategy for warfare in the past, it can be used against the U.S. too. Stuxnet was an outlier at the time. But we Read More 30 Oct 2021News.Opentext Is empathy drowning in a sea of data?The idea of the family doctor has passed into history. In fact, fewer and fewer Americans have a primary care provider. Yet empathy is, and must Read More 29 Oct 2021Micro Focus.News COP26: Our Actions Today Impact Tomorrow; Take Part in “Count Us In” ProjectThis year’s COP26, the UN Climate Change Conference, is a key event in 2021. As world leaders come together to commit to urgent global climate Read More 28 Oct 2021McAfee.News.Webinars Why an Ounce of Cybersecurity Prevention is Worth a Pound of DetectionAt that point, you’re looking to find out what your adversaries have seen or stolen, you want to plug the holes that enabled the hack and Read More 27 Oct 2021News.ThreatMark ThreatMark attracts additional funding; appoints Daniel Rawlings as new CEO & President to lead the next phase of expansion & growthPrague, Brno, 21st October 2021 – ThreatMark, provider of the most advanced online fraud prevention solution in the market, has completed a new Read More 27 Oct 2021Cofense.News Cybersecurity First – It’s Everyone’s Job!Cybersecurity goes beyond October By Tonia Dudley Start the cybersecurity journey early with your employees or teammates. Work with your human Read More 26 Oct 2021Forcepoint.News Forcepoint Closes Acquisition of BitglassThat’s why I’m excited to announce today Forcepoint completed the acquisition of Security Service Edge (SSE) leader Bitglass. Bitglass helps Read More 26 Oct 2021BeyondTrust.Gartner.News Top 6 Overlooked Identity Security Problems | BeyondTrustTop 6 Overlooked Identity Security Problems | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time in a row. Read More 26 Oct 2021News.Qualys Vulnerability On-Demand Search Reporting & Easy Download optionsVulnerability reporting is different from any other aspect of a Vulnerability Management Program. The methodologies of Discover, Assess, Report Read More 25 Oct 2021Gartner.McAfee.News Realize Your SASE Vision with Security Service Edge and McAfee EnterpriseMany people are excited about Gartner’s Secure Access Service Edge (SASE) framework and the cloud-native convergence of networks and Read More 25 Oct 2021Micro Focus.News How does social responsibility relate to the Net Promoter® Score?Social responsibility is no longer a ‘niche’, instead it touches every industry around the world, including the software industry. It is Read More 24 Oct 2021News.Press releases.ThreatQuotient Interested in a Career in Cybersecurity? These Tips Can Help Guide Your JourneyInterested in a Career in Cybersecurity? These Tips Can Help Guide Your Journey KASEY ELLO With the current global cybersecurity talent shortage Read More 23 Oct 2021Forcepoint.News Product Spotlights: Network Security Session Coming October 26All of these elements have opened a Pandora’s box. A Robert Half survey found that 49% of employees prefer a hybrid work arrangement that Read More 23 Oct 2021News.Opentext Are your citizens paying a time tax?When was the last time you tried to get something done at your local, state or federal government agency? Did you look forward to it? Was it Read More 21 Oct 2021McAfee.News Is There Really Such a Thing as a Low-Paid Ransomware Operator?Lurking in the shadows of every large-scale attack by organized gangs of cybercriminals, however, there can be found a multitude of smaller Read More 20 Oct 2021Cofense.News Cybersecurity Career AwarenessWith the large gap in the cybersecurity workforce, it’s not surprising that the Cybersecurity and Infrastructure Security Agency (CISA) advocated Read More 19 Oct 2021BeyondTrust.Gartner.News Australian & New Zealand Government Reports Highlight the Value of PAM to Disrupt Cyber Attacks | BeyondTrustAustralian & New Zealand Government Reports Highlight the Value of PAM to Disrupt Cyber Attacks | BeyondTrust 2021 Gartner Magic Quadrant Read More 19 Oct 2021News.Qualys Apple fixes zero-day in iOS and iPadOS 15.0.2 emergency release: Detect and Prioritize Vulnerabilities using VMDR for Mobile DevicesApple recently released iOS and iPadOS 15.0.2 as an emergency security update that addresses 1 critical zero-day vulnerabilities, which is Read More 18 Oct 2021Gartner.McAfee.News China Personal Information Protection Law (PIPL): A New Take on GDPR?GDPR is a framework which requires businesses to implement processes to enable them to understand where data is held, how it is used, how long it Read More 18 Oct 2021News.Riverbed Visibility, Actionable Insights and Performance for the Modern, Hybrid Enterprise | RiverbedThis is an exciting week, as we host the Riverbed Global User Conference with thousands from both the Riverbed and Aternity user communities Read More 18 Oct 2021Micro Focus.News Software: Successfully Educated.I am Dr. James D. Borderick, and I look after the Competitive Benchmark research for Micro Focus, which I have been doing for over five years. I Read More 17 Oct 2021News.Press releases.ThreatQuotient.Webinars Curate and Share Threat Intelligence to Accelerate Security OperationsCurate and Share Threat Intelligence to Accelerate Security Operations MIKE SOLOMON AND ROSS HAMMER Over the last several months we’ve seen Read More 17 Oct 2021Indeed Identity.News Indeed PAM 2.6: modern response to potential threatsThe Indeed PAM software suite has been updated to Version 2.6. The release includes a lot of improvements and a number of new features that make Read More 16 Oct 2021Forcepoint.News To Cloud or Not to Cloud? The Case for a Hybrid InfrastructureBut, it’s not all good news. In the process of breaking barriers, security best practices were sometimes sacrificed. As with anything in the Read More 16 Oct 2021News.Opentext #BeCyberSmart: Detect forensically and respond rapidlyOctober is Cyber Awareness Month. To mark this I’m writing about a subject that is close to my heart, a subject I believe is our best Read More 14 Oct 2021McAfee.News 2021 Hispanic Heritage Month Pt. 5: A Celebration of Hispanic Heritage and HopeWhat do you enjoy most about your heritage and what is one of your favorite memories growing up? I love the food and music. To this day I Read More 13 Oct 2021Cofense.News Fight the Phish! Don’t Hesitate to report phishing!With phishing threats still the largest threat leading to a data breach, it’s not surprising that Department of Homeland Security (DHS) / Read More 12 Oct 2021BeyondTrust.Gartner.News ACSC Essential Eight | BeyondTrustACSC Essential Eight | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time in a row. Learn why! Dismiss Read More 12 Oct 2021News.Qualys From Technical Features to Customer Security MetricsQualys solutions are packed with great functionality to deliver operational efficiency to all our customers, but the value does not end with bits Read More 11 Oct 2021Ivanti.News 3Ps of Security: Protect, Prioritize and PatchLike a football or soccer team, security also has two lineups that must be continuously managed. One lineup involves protecting the digital Read More 11 Oct 2021McAfee.News Shaping the Future of CybersecurityI’m incredibly proud to be writing this as the newly appointed CEO of this combined business. Keeping nations and large enterprises safe is Read More 10 Oct 2021News.ThreatQuotient How Integration is Evolving: The X Factor in XDRXDR must be approached as an open architecture where integration is the linchpin Over the past couple of months, I’ve talked about how Read More 9 Oct 2021Forcepoint.Gartner.News Data Security Session Coming October 12As companies begin to open offices post-pandemic, Gartner sites 82% of organizations intend to permit remote working some of the time—even after Read More 9 Oct 2021News.Opentext How to increase billable hours and revenue for your law firmHow much time does the average person spend on their phone? Not surprisingly, a lot. People are spending an average screen time of 5.4 hours on Read More 7 Oct 2021McAfee.News Executive Spotlight: Q&A with Vice President, Global Commercial, Britt NorwoodQ: What’s the first career you dreamed of having as a kid? My first career was as a paper boy from 5th through 8th grade, but I always Read More 6 Oct 2021Cofense.News Be Cyber Smart: Four Steps to Protecting Your Business or HomeAs we kick of Cybersecurity Awareness Month, let’s start with a bit of background before digging into this week’s #BeCyberSmart theme. The Read More 5 Oct 2021Forcepoint.Gartner.News Value of SASE: Mitigate Threats to Data SecurityEnsuring that you can maintain control over such data, whether it’s a spreadsheet that has been downloaded to a laptop or a document stored in Read More 5 Oct 2021BeyondTrust.Gartner.News TrickBot Attack Chain: Deconstructed & Mitigated | BeyondTrustTrickBot Attack Chain: Deconstructed & Mitigated | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time Read More 5 Oct 2021News.Qualys QID Spotlight: Discover Azul Java VulnerabilitiesThe Qualys vulnerability signatures team has released a new series of signatures (detections) for Azul Java, allowing security teams to identify Read More 3 Oct 2021News.ThreatQuotient ThreatQuotient Publishes Research Report: State of Cyber Security Automation Adoption in 2021Report highlights trends and challenges of automating IT security systems and how CISOs and senior security professionals are planning to Read More 3 Oct 2021News.Riverbed Improved Alerting | NetIM Infrastructure Monitoring | RiverbedIf I had to pick one theme for the Riverbed NetIM infrastructure monitoring release (version 2.4), it would have to be new and improved alerting. Read More 2 Oct 2021Forcepoint.News Forcepoint Product Spotlights: Sessions to help secure your perimeter, secure your dataRegister for a Forcepoint Product Spotlight At Forcepoint, our goal is to arm our customers with technology that enables a hybrid workforce to be Read More 2 Oct 2021News.PROFITAP Profitap Showcases Network Monitoring Solutions at GITEX’21 in DubaiThe GITEX Technology Week (October 17-21, 2021, in Dubai, United Arab Emirates) is the biggest tech show in the Middle East, North Africa & Read More 2 Oct 2021News.Opentext National Day for Truth & ReconciliationReconciliation is not a noun. It is not an event. It’s a verb. – Roberta Jamieson Today we honor the lost children and Survivors of Read More 1 Oct 2021Indeed Identity.News Building Mindset for Privileged Account ManagementFor most companies PAM is something that is associated with creating borders or limitations. Often organizations are forced to implement PAM due Read More 1 Oct 2021Micro Focus.News Volunteering to Make Positive Impacts: My Volunteering StoryAs dozens of Micro Focus employees take time out to volunteer at their local foodbanks to support our charity partner Feeding America’s Hunger Read More 30 Sep 2021Gartner.McAfee.News The Art of Ruthless Prioritization and Why it Matters for SecOpsOne of the important goals of SecOps is a faster and more effective collaboration among all personnel involved with security. The team seeks to Read More 29 Sep 2021Cofense.News Three is the Magic NumberWhen it comes to prioritizing or recalling information, three is the magic number. Many of us know this thanks to Schoolhouse Rock with the Read More 28 Sep 2021BeyondTrust.Gartner.News Privileged Password Management in a Zero Trust Environment | BeyondTrustPrivileged Password Management in a Zero Trust Environment | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third Read More 28 Sep 2021News.Qualys Prioritize Remediation with a Perceived-Risk Approach to Strengthen CyberSecurity EffectivenessMinimizing Time To Remediate (TTR) is becoming one of the key metrics of security program effectiveness. This holistic measure represents many Read More 27 Sep 2021McAfee.News Detecting Credential Stealing Attacks Through Active In-Network DefensePost initial compromise, to be able to execute meaningful attacks, attackers would need to steal credentials to move laterally inside the Read More 26 Sep 2021News.Press releases.ThreatQuotient ThreatQuotient Continues Tradition of Celebrating World Rhino Day in 2021Rhino conservation efforts remain an important mission for the Reston, Va. based cybersecurity company Reston, Va. – Sept. 22, 2021 – Read More 25 Sep 2021Forcepoint.News How Two Fortune 150 Companies Save Millions With ForcepointApart from the obvious advantages of protecting the brand’s reputation and avoiding financial penalties by defending against security threats, Read More 25 Sep 2021News.Opentext Enabling highly personalized content at scale with customer dataFor content marketers, finding out that the campaign you worked so hard on didn’t hit the spot is incredibly frustrating. It’s even Read More 24 Sep 2021Micro Focus.News “Staying Current” is Not Just a Fashion StatementKeeping up with the latest fashion trends can be an uncomfortable and costly exercise. Having mistakenly perceived the wisdom of flared trousers, Read More 23 Sep 2021McAfee.News McAfee Enterprise Defender Blog | OMIGOD Vulnerability Opening the Door to Mirai BotnetThis month Microsoft released patches for 86 vulnerabilities. While many of these vulnerabilities are important and should be patched as soon as Read More 22 Sep 2021Cofense.News Phishing as a Ransomware PrecursorFor what seems like years now, ransomware has captured headlines due to its sensationally disruptive and costly nature. And over these years, Read More 21 Sep 2021BeyondTrust.Gartner.News Remote Access Control Strategies for the Work-from-Anywhere (WFA) Era | BeyondTrustRemote Access Control Strategies for the Work-from-Anywhere (WFA) Era | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader Read More 21 Sep 2021News.Qualys Improving Cybersecurity Practices by Managing the Asset LifecycleSecuring enterprise environments continues to increase in importance. Attacks on infrastructure continue to increase and organizations need to Read More 20 Sep 2021McAfee.News The Bug Report | September 2021: CVE-2021-40444There’s a lot of information out there on critical vulnerabilities; this short bug report contains an overview of what we believe to be the Read More 19 Sep 2021Gartner.News.ThreatQuotient How Threat Response is EvolvingAs adversaries changed their view of an attack to include vectors across an organization, defenders have had to evolve their approach as well. Read More 18 Sep 2021Forcepoint.News Value of SASE: Secure Data in the CloudTo mitigate this risk, many businesses and government agencies began shifting to cloud-based security to replace the on-premises solutions. In Read More 18 Sep 2021News.Opentext Innovating with your customersFrom healthcare to supply chains to cyber security, the global pandemic has fundamentally changed how we live and work. Although digital Read More 16 Sep 2021McAfee.News Executive Spotlight: Q&A with SVP of Global Channels, Kathleen CurryQ: Who has been the most influential person in your life? My father instilled in me, from as far back as I can remember, that I can do whatever I Read More 14 Sep 2021Forcepoint.News Network Security: The Invisible DefenderThe shift to remote work and the increasing complexity of the technology landscape – with most organizations now running hybrid infrastructures Read More 14 Sep 2021BeyondTrust.Gartner.News How Well do Windows 10 Security Features Protect against Ransomware? | BeyondTrustHow Well do Windows 10 Security Features Protect against Ransomware? | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for Read More 13 Sep 2021McAfee.News How to Talk to Your Grandparents About CybersecurityWith Grandparent’s Day right around the corner, here’s a guide on how you can help keep your grandparents safe from the Read More 12 Sep 2021News.Press releases.ThreatQuotient Leveraging MISP and TheHive When You Create Your CTI PracticeLeveraging MISP and TheHive When You Create Your CTI Practice CYRILLE BADEAU Many CISOs I speak with across Europe tell me their cybersecurity Read More 12 Sep 2021News.Versasec Our newest hires expand our R&D and Tech Support groupsDate: 2021-09-10Author: Yvonne Moebius, Human Resources Previous << vSECCMS61 Changing Credential Template on Already Issued Credentials Read More 11 Sep 2021Forcepoint.News The Digital Journey for Our Customers and Partners Just Got BetterHere’s what you told us: I’m excited to share enhancements made to our Forcepoint Customer Hub that directly resulted from our community’s input. Read More 11 Sep 2021Ivanti.News Fighting Ransomware: Using Ivanti’s Platform to Build a Resilient Zero Trust Security Defense – Part 2Within the initial blog in this series, we discussed ransomware attacks and their remediation on Android mobile devices. Part 2 addresses Read More 11 Sep 2021News.Opentext Three MDR strategies for government CISOs to quickly detect and respond to threatsThe US President’s Cybersecurity Executive Order, released in May 2021, outlines “the persistent and increasingly sophisticated Read More 9 Sep 2021McAfee.News Executive Spotlight: Q&A with Chief Public Policy Officer, Tom GannQ: What is one event in your life that made you who you are today? Teaching tennis. I know that teaching tennis is not an event, it’s a Read More 7 Sep 2021BeyondTrust.Gartner.News BeyondTrust Celebrates “Summer of Pride”, Culminating with BeyondDiversity 2021 Summit | BeyondTrustBeyondTrust Celebrates “Summer of Pride”, Culminating with BeyondDiversity 2021 Summit | BeyondTrust 2021 Gartner Magic Quadrant names Read More 6 Sep 2021McAfee.News Executive Spotlight: Q&A with EMEA Senior Vice President, Adam PhilpottQ: Do you have a role model? If so, who is it? Well, there are work and there are more personal role models. At work, I have several past and Read More 5 Sep 2021News.Press releases.ThreatQuotient Learn Why Frost & Sullivan Names ThreatQuotient the XDR Competitive Strategy LeaderLearn Why Frost & Sullivan Names ThreatQuotient the XDR Competitive Strategy Leader MARC SOLOMON Extended Detection and Response (XDR) is the Read More 5 Sep 2021News.Versasec Adolfsson Named Global Product Manager for vSEC:CMSDate: 2021-09-02Author: Yvonne Moebius, Human Resources Previous << PKI Cybersecurity on rise in ASEAN During his nearly five years with Read More 4 Sep 2021News.Opentext AWS for Health and OpenText for Healthcare – Better togetherEarlier this month Amazon Web Services introduced AWS for Health, an offering of curated AWS services and AWS Partner Network solutions used by Read More 3 Sep 2021Micro Focus.News Ensure Customers Receive Return on their Software Investment by being Socially ResponsibleIn our recent work, we have demonstrated the importance of social responsibility and environmentalism for business and have shown how brands are Read More 2 Sep 2021News.PROFITAP Network blind spots: TAPs vs SPAN portsNetwork blind spots could be compared to a slow gas leak. They are hidden areas of the network that negatively impact the network’s Read More 2 Sep 2021Gartner.McAfee.News.Webinars SASE, Cloud Threats and MITREAs a quick refresher, the MITRE Att&CK Matrix represents the relationship between attacker Tactics and Techniques: As you know, McAfee Read More 1 Sep 2021Cofense.News Mobile Messaging Service Abused for PhishingUsing Cofense Vision, analysts at the Cofense Phishing Defense Center (PDC) were able to drill down into the targeting patterns of one phishing Read More 31 Aug 2021Forcepoint.Gartner.News.Webinars Value of SASE: Separating Product from PhilosophySASE isn’t a single product; it’s an architecture or philosophy, according to Gartner analyst Nat Smith. Many vendors now offer bundled solutions Read More 31 Aug 2021BeyondTrust.Gartner.News Good User Experience Leads to Good Security | BeyondTrustGood User Experience Leads to Good Security | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time in a row. Read More 29 Aug 2021Gartner.News.ThreatQuotient How Threat Detection is EvolvingAs adversaries have shifted the focus of attacks to achieve their goals, defenders must evolve their approach to threat detection The threat Read More 29 Aug 2021News.Versasec User Self-Service with vSEC:CMS is Easier than EverDate: 2021-08-24Author: Joerg Dettmann, CTO Previous << Cybercrime is global and so is MFA With every new version of our flagship identity Read More 28 Aug 2021News.Opentext What’s new in OpenText Gupta SQLBase 12.3OpenText™ Gupta SQLBase 12.3 increases access security, provides the tools to comply with data protection regulations like GDPR. The query Read More 26 Aug 2021McAfee.News McAfee Enterprise ATR Uncovers Vulnerabilities in Globally Used B. Braun Infusion PumpCVE-2021-33886 – Use of Externally-Controlled Format String (CVSS 7.7) CVE-2021-33885 – Insufficient Verification of Data Read More 24 Aug 2021News.Titus Why India has Introduced the New Personal Data Protection BillHome » Titus Blog » Why India has Introduced the New Personal Data Protection Bill Maheswaran Shanmugasundaram · Friday, August 20th, Read More 24 Aug 2021BeyondTrust.Gartner.News.Webinars DevOps Security Lessons | BeyondTrustDevOps Security Lessons | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time in a row. Learn why! Dismiss Read More 22 Aug 2021News.Press releases.ThreatQuotient Defence Engineering and Threat Intel – No Stone Left UnturnedDefence Engineering and Threat Intel – No Stone Left Unturned ANTHONY STITT Every breach starts as a compromise that goes unnoticed and Read More 22 Aug 2021News.Versasec Multi-factor authentication is the easiest way to prevent breachesDate: 2021-08-17Author: Chin Jien Lau, Technical Consultant Previous << Hardware Based PKI Webinar The biggest headline-grabbing Read More 21 Aug 2021Forcepoint.News.Webinars SASE’s Role in Retail and HospitalityThat’s where Secure Access Service Edge (SASE) architecture comes in. How can highly distributed organizations, especially ones in which 24/7 Read More 21 Aug 2021News.Opentext.Press releases Learn all about developer services in 15 minutesDevelopers can find it hard to gain insightful and practical knowledge about developer services. Reading lengthy, business-oriented documentation Read More 20 Aug 2021Micro Focus.News Micro Focus Supports Canada’s First Sustainable IT PledgeThe importance of us all taking action to protect the environment has never been greater, which is why Micro Focus is proud to sign the CIO Read More 19 Aug 2021cPacket Networks.News August 2021 NewsletterThe post August 2021 Newsletter appeared first on cPacket Networks.Read More 18 Aug 2021News.Riverbed Supply Chain Attacks | Identify Indicators of compromise | RiverbedConsider a soft drinks manufacturer. If a competitor wanted to damage its market shares, rather than targeting the bottling plant, it would be Read More 17 Aug 2021BeyondTrust.Gartner.News What is System for Cross-domain Identity Management (SCIM) & What are the Benefits? | BeyondTrustWhat is System for Cross-domain Identity Management (SCIM) & What are the Benefits? | BeyondTrust 2021 Gartner Magic Quadrant names Read More 17 Aug 2021News.Qualys Google Android August 2021 Security Patch Vulnerabilities: Discover and Take Remote Response Action Using VMDR for Mobile DevicesThe recently released Android Security Bulletin for August 2021 addresses 36 vulnerabilities, out of which 5 are rated as critical Read More 15 Aug 2021Gartner.News.Press releases.ThreatQuotient Are You Prepared to Better Protect Against SANS’ Top Attacks and Threats?Are You Prepared to Better Protect Against SANS’ Top Attacks and Threats? ANDY GEPERT The SANS 2021 Top New Attacks and Threat Report is Read More 15 Aug 2021News.Versasec Hardware-based PKI is on the rise in ASEAN: Learn whyCompany Blog Our blog addresses the latest security trends and stories. The posts discuss how identity and access management are playing a larger Read More 14 Aug 2021Forcepoint.News “Tiny Crimes” – the WFH behaviors that invite cyber risk (Australian Survey)Here’s a condensed version of the conversation: Dr Margaret Cunningham, Principal Research Scientist at Forcepoint, and Nick Savvides, Read More 14 Aug 2021News.Opentext Get business content management up and running fast with no IT supportThorsten Fischer leads the Product Management team responsible for the OpenText next-generation SaaS content services Read More 12 Aug 2021McAfee.News Data Centric Zero Trust for Federal Government CybersecurityWhereas the DoD architecture establishes control planes that each have their own decision point, with data given its own decision point, NIST Read More 11 Aug 2021Ivanti.News August Patch Tuesday 2021August Patch Tuesday is much lighter than the past few months. A total of 44 vulnerabilities were resolved by Microsoft, seven of which are rated Read More 10 Aug 2021Forcepoint.News Bringing Government-Strength Data Protection to a Commercial Operational EnvironmentYou can read more about cross-domain solutions and Forcepoint Data Guard in part one of our blog series. However, in today’s integrated digital Read More 10 Aug 2021BeyondTrust.News KuppingerCole Executive Review of Endpoint Privilege Management & the BeyondTrust Solution | BeyondTrustRisks of Digital Transformation The coronavirus pandemic sparked a renewed push for digital transformation, so organizations could adapt, become Read More 10 Aug 2021News.Qualys Tenacity – An Adversary Emulation Tool for PersistencePersistence is one of the more sought-after techniques of an attacker or adversary. Persistence is achieved through a set of tactics or Read More 9 Aug 2021McAfee.News White House Executive Order – Improving Detection of Cybersecurity VulnerabilitiesBetween the initial publication of the Executive Order (EO) for Improving the Nation’s Cybersecurity on May 12 and late July, a flurry of Read More 9 Aug 2021Micro Focus.News Why is Software Education so Important?Education. This is not normally a touchpoint along the customer journey that most people think of when describing the main interaction points Read More 8 Aug 2021News.ThreatQuotient Security is a Big Data Problem, and It’s Getting BiggerSolving security’s big data problem is about prioritized data flow, continuously processing data for analysis and translating and exporting Read More 8 Aug 2021News.Versasec PKI & MFA: What you need to knowDate: 2021-08-02Author: Carolina Martinez, GM Americas Previous << MFA Welcome to the second installment in our Summer Series of video Read More 7 Aug 2021Forcepoint.News New Approaches for ‘Air Gapped’ IT and OT Environments for Critical InfrastructureIn this new world of interconnected systems, critical infrastructure organizations benefit from a multitude of Internet of Things devices with Read More 7 Aug 2021News.Opentext OpenText’s 2021 Corporate Citizenship ReportThese past 18 months have made it clear that companies have an opportunity to create positive change, not just for employees and customers, but Read More 5 Aug 2021McAfee.News New Company, Same Commitment: Channel FirstAs we start this chapter as a pure-play enterprise security company, my focus is on adding value for our partners at all levels, ensuring our Read More 3 Aug 2021News.Titus Enterprise Data Classification: Why you need best-of-breed data classificationHome » Titus Blog » Enterprise Data Classification: Why you need best-of-breed data classification Georgina Stockley · Wednesday, July Read More 3 Aug 2021Forcepoint.News Transforming the Science of Security with Human FactorsMy colleague Dr. Calvin Nobles, department chair and associate professor of information and management at the Illinois Tech College of Computing, Read More 3 Aug 2021BeyondTrust.Gartner.News The Seven Perils of Privilege: How Exactly Can You Avoid Them? | BeyondTrust The Seven Perils of Privilege: How Exactly Can You Avoid Them? | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the Read More 3 Aug 2021News.Qualys Qualys Research Nominated for Pwnie Awards 2021The Qualys Research team has been nominated for five Pwnie Awards this year in three different categories. In addition to nominations for Best Read More 2 Aug 2021News.PROFITAP Introducing XX-12800G Network Packet BrokerProfitap recently announced the release of XX-12800G, the new high-density Network Packet Broker, bringing the power and flexibility of network Read More 2 Aug 2021McAfee.News Introducing MVISION Cloud Firewall – Delivering Protection Across All Ports and ProtocolsWherever networks went, firewalls followed For a long time, firewalls and computer networks were like conjoined twins. Businesses simply could Read More 1 Aug 2021Gartner.News.Press releases.ThreatQuotient How to Assess and Up-level Your Organization’s Maturity for SOAR, Gartner’s TakeHow to Assess and Up-level Your Organization’s Maturity for SOAR, Gartner’s Take MARC SOLOMON Earlier this year, Gartner published Read More 1 Aug 2021News.Versasec Passwords Do NOT Cut it: Why MFA is Critical TodayDate: 2021-07-28Author: Carolina Martinez, GM Americas Previous << Versasec Registers With FSQS NL It’s time for summer school Read More 31 Jul 2021Forcepoint.News Forcepoint NGFW MITRE ATT&CK simulationIn this scenario, an admin researches an issue, finds a potential solution on a forum. The solution provides a download link to PuTTY. Read More 31 Jul 2021Indeed Identity.News Indeed PAM 2.5: user experience is a key to resilient cybersecurityIndeed Identity presents a new version of Indeed Privileged Access Manager. Indeed PAM 2.5 offers enhanced access policy mechanisms, new features Read More 31 Jul 2021News.Opentext What’s new in OpenText Internet of Things PlatformThe latest announcement by OpenText of Cloud Editions includes some great updates to OpenText Internet of Things Platform. Check out the latest Read More 28 Jul 2021Cofense.News Reporting Matters – even for a Smishing MessageWith the increased use of mobile devices to manage so much of our lives, it’s no surprise scammers have moved to this medium to target your Read More 27 Jul 2021News.ThreatMark ThreatMark recognized as a Representative Vendor in 2021 Gartner Market Guide for Online Fraud DetectionWe are excited to announce that ThreatMark, a developer and provider of advanced fraud prevention solutions, was listed as a Representative Read More 27 Jul 2021Forcepoint.News EO 14028 is “right on time,” but challenges remain in race to develop softwareThe Cybersecurity Executive Order dictated publishing guidance outlining security measures for critical software, on Day 60 (see highlighted Read More 27 Jul 2021BeyondTrust.Gartner.News Should Your Organization Consolidate Its Service Desk Tools? | BeyondTrustShould Your Organization Consolidate Its Service Desk Tools? | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the Read More 27 Jul 2021News.Qualys Protect your Devices from Pegasus Spyware using VMDR for Mobile Devices’ Proactive ApproachPegasus spyware is in the news, and it has been used to target devices of critical people from different sectors and countries including Read More 25 Jul 2021Gartner.News.Press releases.ThreatQuotient Are You Prepared for the Surge in Ransomware?Are You Prepared for the Surge in Ransomware? ANTHONY STITT Incidents of ransomware have been increasing and evolving steadily for years as Read More 25 Jul 2021News.Versasec vSEC:CMS S6.1 announced by Joerg Dettmann, Versasec Founder and CTODate: 2021-07-21Author: Jörg Dettmann, Founder and CTO Previous << FIDO It’s a big week for our technical team and the entire company as we Read More 24 Jul 2021Forcepoint.News Can Cybersecurity Be Robust Without Being Rigid?Decisions around cybersecurity can be stressful, if not plain scary. The stakes are always high, and it seems like there’s a headline related to Read More 24 Jul 2021News.Opentext Using first-party data to deliver personalized and tailored digital experiences at scaleDelivering personalized digital experiences is getting harder even as the technology to do so gets better. As the value of third-party data is Read More 21 Jul 2021Cofense.News Cofense Delivers Industry’s First Cloud-Native Email Security for Microsoft 365 and Google Workspace – Deployable in Less than a MinuteCofense Protect MSP pairs Computer Vision (a field of artificial intelligence) that simulates how humans see, with Cofense PhishMe’s real-world Read More 20 Jul 2021News.Titus U.S. Data Privacy Gains MomentumAdam Strange · Wednesday, July 14th, 2021 As more and more social and economic activities move online, the importance of privacy and data Read More 20 Jul 2021Forcepoint.News.Webinars Boards of Directors: Cyber Risk is the Cost of Doing BusinessPrinciples for Board Governance of Cyber Risk (Report) And this absolutely raises the stakes for Boards of Directors and the critical role they Read More 20 Jul 2021BeyondTrust.News Endpoint Security vs. Network Security – Revisited | BeyondTrustEndpoint Security vs. Network Security – Revisited | BeyondTrust July 19, 2021 Open You May Also Be Interested In: Our website uses cookies Read More 20 Jul 2021News.Qualys Google Android July 2021 Security Patch Vulnerabilities: Discover and Take Remote Response Action Using VMDR for Mobile DevicesThe recently released Android Security Bulletin for July 2021 addresses 44 vulnerabilities, out of which 7 are rated as critical vulnerabilities. Read More 19 Jul 2021cPacket Networks.News cPacket Networks Accelerates Growth with New Headquarters, Expands Facilities and Its Global FootprintThe post cPacket Networks Accelerates Growth with New Headquarters, Expands Facilities and Its Global Footprint appeared first on cPacket Networks.Read More 19 Jul 2021McAfee.News White House Executive Order – Removing Barriers to Sharing Threat InformationElimination of contractual barriers that limit sharing across agencies through FAR modifications The expansion of log retention Mandatory Read More 18 Jul 2021Gartner.News.ThreatQuotient Three Approaches to an XDR ArchitectureExtended Detection and Response (XDR) can be confusing based on so many different definitions and approaches In 2020, Extended Detection and Read More 18 Jul 2021News.Versasec Versasec Joins FIDO AllianceDate: 2021-07-13Author: Jörg Dettmann, CTO Previous << Cybersecurity Denial and Cure This week, we announced we’re now members of the FIDO Read More 17 Jul 2021Forcepoint.News Forcepoint’s Deep Secure Acquisition Shapes the Future of Malware Protection within Cross Domain Solutions and Data-first SASECDR protects enterprises by deconstructing and disarming commonly used files, including MS Office, PDFs , images, etc, and rebuilding them to Read More 17 Jul 2021Indeed Identity.News Video: “PAM is a key driver to have a compliant and secure environment”The growing importance of implementing privileged access management at the corporate level is noted by leading cybersecurity analytics. They Read More 17 Jul 2021News.Opentext Why 91% of enterprises are looking for new integration solutionsEarlier this year, OpenText and IDG surveyed enterprises with more than 1,000 employees on ERP integration, including insights on their current Read More 14 Jul 2021Cofense.News The Difference Between an Attempted Attack and a Widespread Ransomware Attack is Employee ReportingThe recent Kaseya attack, in which threat actors leveraged a zero-day vulnerability over the holiday weekend, demonstrates that ransomware is Read More 13 Jul 2021News.Titus Heads up! New Canadian Data Privacy Act is Around the CornerThe time to prepare to meet soon-to-be-enacted Canadian data privacy regulations is now. Around the world, the awareness of the need to protect Read More 13 Jul 2021Forcepoint.Gartner.News Transforming from “Zero” to “Hero” with Data-first SASEMany organizations are replacing the short-term workarounds implemented during the pandemic to keep people safe, yet productive. Today, Read More 13 Jul 2021BeyondTrust.News BeyondTrust Introduces ServiceNow Integration with Privilege Management for Windows & Mac | BeyondTrustBeyondTrust Introduces ServiceNow Integration with Privilege Management for Windows & Mac | BeyondTrust July 7, 2021 Open You May Also Be Read More 13 Jul 2021News.Qualys Qualys API Best Practices: Host List Detection APIHost List Detection is your subscription’s list of hosts and their corresponding up-to-date detections including: Confirmed Vulnerability Read More 12 Jul 2021McAfee.News Adding Security to Smartsheet with McAfee CASB ConnectIn June 2021, McAfee MVISION Cloud released support for Smartsheet – providing cornerstone CASB services to Smartsheet through the CASB Read More 11 Jul 2021News.Press releases.ThreatQuotient.Webinars 5 Tips to Improve Threat Report Analysis and Action5 Tips to Improve Threat Report Analysis and Action LIZ BUSH Most organizations have more threat intelligence than they know what to do with, Read More 11 Jul 2021News.Versasec Cybersecurity Denial and its Common Sense CureCompany Blog Our blog addresses the latest security trends and stories. The posts discuss how identity and access management are playing a larger Read More 11 Jul 2021Ivanti.News Apple WWDC 2021Apple’s Worldwide Developers Conference is a week of amazing sessions that define the coming year, announce new features, and preview Read More 10 Jul 2021News.Opentext Why effective asset visibility starts at the digital twinThe cost of poor asset visibility is potentially enormous. Estimates suggest companies are losing almost $25 billion each year in the UK alone. Read More 8 Jul 2021Gartner.McAfee.News The Industry Applauds MVISION XDR – Turning Raves into BenefitsExtended Detection and Response products, better known as XDR, not only extended the capabilities of EDR platforms, but according to Gartner[1] Read More 6 Jul 2021BeyondTrust.News Privileged Access Management for DevOps – BeyondTrust Stands out as a Leader in KuppingerCole Report | BeyondTrustPrivileged Access Management for DevOps – BeyondTrust Stands out as a Leader in KuppingerCole Report | BeyondTrust June 30, 2021 Open You May Read More 4 Jul 2021News.ThreatQuotient How to infuse agility into security operationsFor many years, security professionals have talked about the OODA loop. Devised by Colonel John Boyd, it describes a decision-making cycle that Read More 3 Jul 2021Forcepoint.News Forcepoint CASB Helps Global Customers Safely Adapt to Hybrid Workplace ChangesCompanies are increasingly turning to cloud services to ensure their employees have access to important business data and resources from anywhere Read More 3 Jul 2021Forcepoint.News Forcepoint CASB Helps Global Customers Safely Adapt to Hybrid Workplace ChangesCompanies are increasingly turning to cloud services to ensure their employees have access to important business data and resources from anywhere Read More 3 Jul 2021News.Opentext OpenText employee wins The Outstanding Workers of the Republic Awards (TOWER)We are excited to announce that one of our employees, Nell D. Pagkalinawan, Principal Cloud Applications Consultant, has been recognized as one Read More 3 Jul 2021News.Riverbed SSL Certificate Management Made Simple, Secure, and at Scale | RiverbedSSL and TLS traffic are among the most common forms of secure network traffic in today’s enterprise. The Riverbed Application Acceleration Read More 2 Jul 2021News.PROFITAP Timestamp analysis: why you need it and 3 efficient ways to run itA crucial aspect of running and maintaining a network is achieving optimal performance. In the context of network monitoring, performance can be Read More 2 Jul 2021Micro Focus.News How does social responsibility relate to customer trust?Introduction Social responsibility is no longer a ‘niche’, instead it touches every industry around the world, including the software industry. Read More 1 Jul 2021McAfee.News.Webinars How to Proactively Increase Your Protection Against Ransomware with Threat IntelligenceWhich Ransomware campaigns and threat profiles are most likely going to hit you? MVISION Insights provides near real time statistics on the Read More 1 Jul 2021Allied Telesis.News Intelligent Asset Management: Riding the Wave of Predictive MaintenanceMaintenance and Repair Operations (MRO) are among the most important activities of modern industrial organizations. They enable enterprises to Read More 29 Jun 2021Forcepoint.News Spend now, pay later? Settling the score of technical debtTechnical debt is a complex concept, going back decades, and relatively simple misconfigurations like Fastly’s are just a very visible example of Read More 29 Jun 2021BeyondTrust.News.Webinars Taking PAM Back to the Basics: Privileged Password Management | BeyondTrustTaking PAM Back to the Basics: Privileged Password Management | BeyondTrust June 28, 2021 Open You May Also Be Interested In: Our website uses Read More 27 Jun 2021News.ThreatQuotient XDR is a Destination, Not a SolutionIf we define XDR as a solution, SOCs can’t reach their ultimate destination because, as a solution, XDR can’t be a holistic approach Read More 27 Jun 2021News.Versasec Another Perk of MFA: Lowered Insurance PremiumsDate: 2021-06-24Author: Carolina Martinez, General Manager Americas Previous << Governments Working Hard To Better Protect User Identities Read More 26 Jun 2021News.Opentext.Press releases What’s new in OpenText AxcelerateThe latest announcement by OpenText of Cloud Editions includes some great updates to OpenText™ Axcelerate™. Check out the latest Read More 25 Jun 2021Micro Focus.News Micro Focus Consulting. Professional. Service.I am Dr. James D. Borderick, and I look after the Competitive Benchmark research for Micro Focus, which I have been doing for over five years. I Read More 24 Jun 202124 Jun 2021Siemplify.Vendors REAL security to distribute Siemplify to serve the Southeast European region’s need for SOAR platformA distribution agreement has been concluded between Israel-headquartered Siemplify, the #1 Independent SOAR Platform, and Slovenia-based REAL Read More 24 Jun 2021Gartner.McAfee.News Transforming to a Predictive Cyber DefenseIf you’re like me, working from a home office, you can’t help but think about all of the cybersecurity tradeoffs that accompanied the Read More 23 Jun 2021Cofense.News It’s Not Safe: “Security Update” Goes Phishing via PDFFigure 1: Email Body The Cofense Phishing Defense Center (PDC) has observed a phishing campaign that aims to harvest Office365 (O365) Read More 22 Jun 2021News.Titus Data Classification Best PracticesAdam Strange · Monday, June 21st, 2021 Data classification tools not only help organizations to protect their data, they also help users Read More 22 Jun 2021Forcepoint.News Securing the Workforce of the Future – ForcepointFujitsu’s Head of Strategy and Growth, Workforce and Workspace Services, Andy Davis joined Forcepoint to discuss the changes and measures Read More 22 Jun 2021BeyondTrust.News IDSA Study Shows IT Leaders Embracing Identity-Centric Security to Close Remote Work & DX Gaps | BeyondTrustIDSA Study Shows IT Leaders Embracing Identity-Centric Security to Close Remote Work & DX Gaps | BeyondTrust June 18, 2021 Open You May Also Read More 21 Jun 2021McAfee.News Testing to Ensure Your Security Posture Never SlouchesTake, for example, the May 7th DarkSide ransomware attack that shut down Colonial Pipeline’s distribution network. That well-publicized Read More 20 Jun 2021News.ThreatQuotient ThreatQuotient Recognized as Best Security Investigation Platform by 2021 CDM Global Infosec AwardsRecent Award Wins Highlight Innovative Threat Intelligence and Security Investigation Capabilities, Women in Cybersecurity Leadership Reston, Va. Read More 20 Jun 2021News.Versasec As PKI Requirements in Government Agencies Grow, Versasec is there to HelpDate: 2021-06-17Author: Carolina Martinez, General Manager Americas Previous << MFA Could Have Prevented Pipeline Attack Better protecting Read More 19 Jun 2021Forcepoint.
3 Feb 2023News.Riverbed Don’t Wait for Zero Day – Proactively Detect Threats with Alluvio | RiverbedYour personal information being leaked or sold online is something that strikes fear into the hearts of most people. Identity theft takes this Read More
3 Feb 2023News.Riverbed Don’t Wait for Zero Day – Proactively Detect Threats with Alluvio | RiverbedYour personal information being leaked or sold online is something that strikes fear into the hearts of most people. Identity theft takes this Read More
3 Feb 2023Micro Focus.News OpenText Welcomes Micro Focus Customers, Partners and EmployeesOpenText CEO and CTO Mark Barrenechea blogs on how the Micro Focus acquisition expands OpenText’s mission to help enterprise… View Read More
2 Feb 2023News.PROFITAP The advantages of ProfiShark as a portable network traffic capture deviceProfiShark is a portable network traffic capture device that is designed for use in a variety of scenarios, including network troubleshooting, Read More
31 Jan 2023BeyondTrust.News.Webinars 5 Key IT Service Desk Improvement Trends | BeyondTrustWhat are the key improvement areas your IT service desk needs to focus on? Of course, there are the metrics and key performance indicators (KPIs) Read More
31 Jan 2023News.Qualys Managing Security Configuration Risk with the Most Comprehensive Configuration Compliance Solution!Table of Contents Qualys leads the industry with 850 policies, 19000 controls, 350 technologies, and 100 frameworks Remote and hybrid work, Read More
30 Jan 2023Micro Focus.News I Feel the Need, The Need for SpeedChad Lerash is Global Campaigns Program Manager at Micro Focus and a motorsports fanatic. This, the second post in his series following Jaguar Read More
29 Jan 2023News.Press releases.ThreatQuotient.Webinars Effectively meeting and exceeding the requirements of the SAMA Cyber Threat Intelligence PrinciplesEffectively meeting and exceeding the requirements of the SAMA Cyber Threat Intelligence Principles Munaf Kazi Responsible for supervising nearly Read More
28 Jan 2023Forcepoint.News Forcepoint Releases DLP at Scale to CustomersEnabling DLP at greater scale We also recently extended the capabilities of Risk-Adaptive Protection, helping customers utilize this powerful Read More
24 Jan 2023BeyondTrust.News BeyondTrust Achieves FedRAMP Moderate “In-Process”… | BeyondTrustBeyondTrust has achieved the “In Process” designation for its Remote Support (RS) and Privileged Remote Access (PRA) solutions by the Federal Read More
24 Jan 2023News.Qualys The January 2023 Oracle Critical Patch Update Last updated on: January 18, 2023 This Oracle Critical Patch Update contains a group of patches for multiple security vulnerabilities that Read More
23 Jan 2023Micro Focus.News Jaguar TCS Racing and Micro Focus— Sustainability at Peak VelocityMicro Focus is the technical partner of Jaguar TCS Racing, which last November launched its new Jaguar I-TYPE 6, the lightest, fastest, most Read More
22 Jan 2023News.Niagara Networks Quantum Computing and the Impact on Data EncryptionQuantum computing has the potential to revolutionize many fields, including encryption. In recent years, there has been a lot of interest in Read More
22 Jan 2023News.Press releases.ThreatQuotient.Webinars Here’s What ThreatQuotient’s Crystal Ball Says for 2023Here’s What ThreatQuotient’s Crystal Ball Says for 2023 Dave Krasik From the team at ThreatQuotient, we hope you had a wonderful 2022 Read More
21 Jan 2023Forcepoint.News Security News—Breaking RSA Encryption, Hacks at Royal Mail, PayPal and T-Mobile and More ChatGPTPayPal is notifying thousands of users that their accounts were accessed through a large-scale credential stuffing attack that exposed some Read More
19 Jan 2023News.ThreatMark The Phishers Favorite PondIn an effort to keep our customers up to speed on the latest trends when it comes to fraud detection and prevention, ThreatMark presents our Read More
18 Jan 2023News.Riverbed Diagnosing and Treating Network Challenges in Public Hospitals | RiverbedTechnology has changed how the healthcare industry functions in almost every aspect, from providing care to managing patient records to Read More
17 Jan 2023BeyondTrust.News What is the IT Support Swarming Model & How Can You… | BeyondTrustToday’s technology support landscape is rapidly changing. Whether you’re supporting internal employees or external customers, your end-users are Read More
17 Jan 2023News.Qualys Detection of Vulnerabilities in JavaScript LibrariesJavaScript is a popular programming language which is an integral component while developing interactive and dynamic web applications. It allows Read More
15 Jan 2023News.ThreatQuotient SANS CyberThreat: an inside track on Europe’s premier cyber security conferenceIn January the eyes of the global cyber security community will turn to London as the Cyberthreat conference gets under way. First launched Read More
14 Jan 2023Forcepoint.News Forcepoint Earns Spot on Built In’s Best Places to Work in Multiple CitiesThank you, Team Forcepoint. Your involvement in Employee Resource Groups, think tanks, holiday celebrations and Hackathons, to name just a few, Read More
13 Jan 202313 Jan 2023News.Webinars Fortra featuring Forrester; Cybersecurity Threats In Europe: What You Need to Know and What to Do About ThemRead More
10 Jan 2023BeyondTrust.News Cyber Insurance: What it is, What is Covered, & How to… | BeyondTrustWhat is cyber insurance? A cyber insurance policy is an insurance product designed to protect an organization from the risks associated with Read More
10 Jan 2023News.Qualys Implement Risk-Based Vulnerability Management with Qualys TruRisk™: Part 3In this final blog of the series, we will discuss the importance of implementing effective risk-based remediation strategies to reduce the risk Read More
9 Jan 2023Micro Focus.News IT Strategy—Is a Democracy Merited?IT decisions—not always popular, and often taken in isolation. What can IT leaders do to make IT strategy more inclusive and—crucially—more Read More
8 Jan 2023News.ThreatQuotient XDR and the Age-old Problem of Alert FatigueXDR’s fully loaded value to threat detection, investigation and response will only be realized when it is viewed as an architecture Read More
7 Jan 2023Forcepoint.Gartner.News Security News—ChatGPT Mania Continues, AI’s Role in Cybersecurity, New Breaches at CircleCI and Slack and MoreDefensive vs. offensive AI: Why security teams are losing the AI war Here’s an overview of some other cybersecurity stories getting our Read More
3 Jan 2023News.Qualys Qualys Threat Research Unit: Threat Thursdays, December 2022 Welcome to the fourth edition of the Qualys Threat Research Unit’s (TRU) “Threat Research Thursday”, where we collect and curate notable new Read More
3 Jan 2023News.Riverbed Improving Digitized Work Processes with DEX | RiverbedIn my last blog article, I drew the comparison between the engine warning light in a car and IT monitoring. But what does that mean in detail? An Read More
2 Jan 2023News.PROFITAP How to TAP 40/100G BiDi connectionsBandwidth demand in data centers and campus networks is increasing due to growing virtualization. In data centers, this has a particular impact Read More
27 Dec 2022BeyondTrust.News Technology Alliance Outlook for 2023 and Beyond | BeyondTrust‘Tis the season for being merry—and of course for all the end-of-year recaps and projections for next year. I wanted to jump on this bandwagon, Read More
25 Dec 2022News.Press releases.ThreatQuotient 2022, Naughty or Nice?2022, Naughty or Nice? Noor Boulos There were so many notable things that have happened in 2022, here’s some to name a few. We have Read More
24 Dec 2022Forcepoint.News Security News—LastPass and Okta Hacks and MorePassword manager company LastPass has confirmed that its customers’ encrypted password vaults, which store passwords and other secrets, Read More
23 Dec 2022Micro Focus.News Tis the Season for Formula E RacingMicro Focus recently renewed our technical partnership with Jaguar TCS Racing for Season 9 of the ABB FIA Formula E Championship. The start of Read More
20 Dec 2022News.Qualys Implement Risk-Based Vulnerability Management with Qualys TruRisk™ : Part 2This blog is a continuation of our first blog on implementing risk-based vulnerability management with Qualys TruRiskTM. In the first blog, we Read More
19 Dec 2022News.ThreatMark The Phishers Greatest AllyIn an effort to keep our customers up to speed on the latest trends when it comes to fraud detection and prevention, ThreatMark presents our Read More
18 Dec 2022News.Press releases.ThreatQuotient.Webinars Tis’ the Season to Read the Hottest TopicsTis’ the Season to Read the Hottest Topics Julia Weifenbach If you find yourself searching for something to summarize the year, Read More
17 Dec 2022Forcepoint.News Five Steps to Simplifying Zero Trust Security with Data-first SASEFor example, many organizations already have investments in Web Security or Cloud Security, but don’t yet have Zero Trust Network Access (ZTNA) Read More
13 Dec 2022BeyondTrust.News Credentials Flagged as Leading Cause of Malicious… | BeyondTrustSince the publication of the first of the Notifiable Data Breach reports by the Office of the Australian Information Commissioner (OAIC), Read More
13 Dec 2022News.Qualys Operationalizing Qualys VMDR With Qualys TruRisk™ – Part 1For today’s CISOs, managing cyber risk is Job #1 priority, and it’s a full-time concern. Security practitioners are spending a considerable Read More
11 Dec 2022News.ThreatQuotient Removing the Barriers to Security Automation ImplementationImplementation of security automation can be overwhelming, and has remained a barrier to adoption Previously, I wrote about balancing Read More
10 Dec 2022Forcepoint.News Forcepoint Data Visibility—Shine a Light on Dark DataHow can you protect data you effectively can’t even see?” This worthless data is often called “dark data.” What makes it Read More
6 Dec 2022News.Titus Lookout and Fortra Partner to Secure Sensitive Data Across the EnterpriseFortra Webmaster · Thursday, December 1st, 2022 Editor’s Note: This blog post was co-authored by Clayton Barnard, Senior Director, Global Read More
6 Dec 2022Forcepoint.Gartner.News Single-vendor SASE will bring data security to every user, app and deviceWe have no choice. The sheer cost of managing solutions compounded by quiet quitters and mass resignations are driving resource-strapped teams to Read More
6 Dec 2022BeyondTrust.News Implementing User Account Control (UAC) Best Practices… | BeyondTrustWhat is User Account Control (UAC)? User Account Control (UAC) is a security feature in the Windows Operating System designed to mitigate the Read More
6 Dec 2022News.Qualys The 9th Google Chrome Zero-Day Threat this Year – Again Just Before the WeekendGoogle has released yet another security update for the Chrome desktop web browser to address a high-severity vulnerability that is being Read More
4 Dec 2022News.Press releases.ThreatQuotient.Webinars Thinking of a SecOps Platform? Showing ROI Just Got EasierThinking of a SecOps Platform? Showing ROI Just Got Easier Noor Boulos As threats have continued to evolve, enterprises have made significant Read More
3 Dec 2022Forcepoint.News Zero Trust CDR Early Access Program: Stop Email Malware NowImagine a brand new, clean data file attached to all emails… and what is being sent out to partners is malware free. Click and use – the file Read More
3 Dec 2022News.Riverbed When an Engine Warning Light Goes On | RiverbedWhile on our summer vacation this year with our Volkswagen Van (“Bulli”), the engine warning light came on. Unfortunately, it was still over 700 Read More
2 Dec 2022Micro Focus.News 4 Ways Micro Focus and AG Ran and Transformed at the Same TimeMicro Focus announced the successful modernization of AG’s mission-critical business systems. AG is Belgium’s largest insurance company, serving Read More
29 Nov 2022Forcepoint.News Using Hardware Logic to Protect Critical InfrastructureGood cyber hygiene — anti-virus scanning and keeping patches up to date – is essential, but these defenses don’t go far enough. Relying on Read More
29 Nov 2022BeyondTrust.News SSH Key Management Overview & 10 Best Practices | BeyondTrustWhat are SSH Keys? Secure Socket Shell (SSH), also called Secure Shell, is a special network protocol leveraging public-key cryptography to Read More
29 Nov 2022News.Qualys Ease Your Cybersecurity Maturity Model Certification Journey With QualysThe Cybersecurity Maturity Model Certification (CMMC) is a cybersecurity training, certification, and assessment program from the United States Read More
27 Nov 2022News.ThreatMark Protecting the PondIn an effort to keep our customers up to speed on the latest trends when it comes to fraud detection and prevention, ThreatMark presents our Read More
25 Nov 2022Micro Focus.News Meet Sarah Martin – EMEA Talent Acquisition ConsultantSoftware, from vision to execution, is a people business – and at Micro Focus, our people are our greatest asset. Helping our employees build Read More
22 Nov 2022Forcepoint.News How agencies are moving zero trust from aspiration to transformationBut as they speed up their adoption of zero-trust security, they still face challenges with legacy applications and architectural gaps; Read More
22 Nov 2022BeyondTrust.News Channeling Cyber psychology to Better Cybersecurity | BeyondTrustIn terms of cybersecurity, an organization’s people (users) are frequently identified as potentially the greatest weakness—the enterprise’s Read More
20 Nov 2022News.Press releases.ThreatQuotient.Webinars How Sysdig is Using the ThreatQ Platform to Enhance Cloud Threat Detection and ResponseHow Sysdig is Using the ThreatQ Platform to Enhance Cloud Threat Detection and Response Michael Clark, Director of Threat Research at Sysdig It Read More
19 Nov 2022News.ThreatMark Don’t Take the BaitIn an effort to keep our customers up to speed on the latest trends when it comes to threat detection and fraud prevention, ThreatMark presents Read More
19 Nov 2022Forcepoint.News Zero Trust Web Access: Making it easy to extend Zero Trust to web access with Forcepoint ONEOne thing that has often been overlooked though is the typical user’s dependency on general web access. It’s important since general web use is Read More
18 Nov 2022News.Riverbed EMA Releases New Report on Network Observability | RiverbedThe recently released report by Enterprise Management Associates (EMA), Network Observability: Delivering Actionable Insights to Network Read More
18 Nov 2022News.Riverbed EMA Releases New Report on Network Observability | RiverbedThe recently released report by Enterprise Management Associates (EMA), Network Observability: Delivering Actionable Insights to Network Read More
18 Nov 2022Micro Focus.News Transforming Towards What?In our latest Professional Services blog, Micro Focus’ Consulting Manager Joshua Brusse argues that transforming into a Digital Factory is Read More
15 Nov 2022News.Titus The Magical Implementation – Preshow AudienceDana McMullan · Wednesday, November 9th, 2022 A magical and practical series of tips, tricks, and a real-world guide to implementing Read More
15 Nov 2022BeyondTrust.News Threat Intelligence: An Explainer | BeyondTrustWhat is threat intelligence? Threat intelligence (also referred to as cyber threat intelligence) collects data and information about threat Read More
15 Nov 2022News.Qualys QSC 2022: That’s a Wrap!Over the years, the threat landscape has exploded, and bad actors have become increasingly sophisticated, making the demand for cloud security Read More
13 Nov 2022News.ThreatQuotient Staying ahead of advanced threats with ThreatQuotientIn an interview with Rahul Raj, Chris Jacob, Global Vice President of ThreatQuotient emphasized the importance of threat segmentation, Read More
12 Nov 2022Forcepoint.News SASE—How to separate the good, the bad, and the uglySASE provides a key path to Zero Trust Yet due to this popularity so many tools and services have applied the SASE moniker to themselves that Read More
8 Nov 2022Forcepoint.News New Solutions to the Evolving Definition of Insider RisksIn some cases, these issues have created significant workplace challenges. Look no further than the pushback some companies have received from Read More
8 Nov 2022News.Qualys OpenSSL Vulnerability RecapLast week a CRITICAL vulnerability in OpenSSL was pre-announced to give organizations a head start in coming up with a playbook for how to Read More
6 Nov 2022News.ThreatQuotient ThreatQuotient lanza su nuevo informe anual sobre el Estado de la Automatización de la Ciberseguridad en las EmpresasLos resultados de la encuesta ponen de manifiesto qué casos de uso de la automatización están funcionando, cuáles Read More
5 Nov 2022Forcepoint.News 2023 State of Security Report: Strive for SimplicityBut for all the benefits brought to the field, companies didn’t escape the downsides. Now, they’re striving to simplify security. A flurry of Read More
4 Nov 2022Micro Focus.News Build Strong Digital Transformation PartnershipsGM of Professional Services Jim Sargent explains why you should find partners to help plan and execute digital transformation initiatives. Find Read More
3 Nov 2022News.Riverbed EMA Names Aternity a Value Leader In DEX | Riverbedfirst EMA Radar™ for Digital Employee Experience Management (DEX) is hot off the press from Enterprise Management Associates®. This report Read More
2 Nov 2022News.PROFITAP Profitap IOTA: Efficient analysis of VoIP issues The transmission of voice over the IP protocol poses various challenges both in corporate networks and in the provider environment. First, Read More
1 Nov 2022Forcepoint.News Hackers Exploit PayPal Invoicing Bug to Launch Advanced Phishing AttacksWith my initial scepticism high, I decided to investigate to see if someone had managed to spoof the domain of PayPal.com. PayPal invoicing is a Read More
1 Nov 2022BeyondTrust.News OpenSSL Security Vulnerability | BeyondTrustThe OpenSSL Organization has announced a critical security vulnerability in versions 3.0.x and above. According to the OpenSSL project team, an Read More
1 Nov 2022News.Qualys Qualys Research Alert: Prepare for a Critical Vulnerability in OpenSSL 3.0On Tuesday, November 1, 2022, the OpenSSL project will release a new version of OpenSSL version 3.0.7 that will patch an as-yet-undisclosed Read More
30 Oct 2022News.Press releases.ThreatQuotient Wrapping up CSAM 2022 with Vulnerability Management Advice for EveryoneWrapping up CSAM 2022 with Vulnerability Management Advice for Everyone Chris Jacob As we wrap up Cybersecurity Awareness Month (CSAM) 2022, the Read More
29 Oct 2022Forcepoint.News Forcepoint Security News ReturnsCISA adds Apple zero-day, Cisco and Gigabyte bugs to exploited vulnerabilities list Here are some top recent security stories getting our Read More
25 Oct 2022Forcepoint.News Insider Threat Awareness Month: A To The Point Cybersecurity Podcast RecapIf your organization is looking to better protect itself from insider threats, we invite you to listen to these episodes, or better Read More
25 Oct 2022BeyondTrust.News Growth Hacking by HackathonBeyondTrust’s September 2022 Hackathon recently concluded, but not before spurring some impressive innovations from our engineering team. Read on Read More
23 Oct 2022News.Press releases.ThreatQuotient Phishing Scams Have Reached New Heights: How to Improve Detection and ResponsePhishing Scams Have Reached New Heights: How to Improve Detection and Response Leon Ward The Anti-Phishing Working Group (APWG) Phishing Activity Read More
22 Oct 2022Forcepoint.News To Make Your Hybrid Workforce More Productive, Focus on Application Access and PerformanceSpot and deal with application performance issues before they become problems To help you with this, Forcepoint is bringing out a series of Read More
21 Oct 2022Micro Focus.News Core System Modernization—A Beastly Challenge?Standfirst: Darwin famously stated that only the most adaptable will survive. How that plays out in enterprise technology raises questions about Read More
18 Oct 2022News.Titus Data Protection Myths and the Truths Behind ThemHelpSystems Webmaster · Thursday, October 13th, 2022 To implement or not to implement? That is the question when evaluating a new Read More
18 Oct 2022BeyondTrust.News Remote Support 22.3 provides many new enhancementsBeyondTrust is pleased to announce the availability of version 22.3 of our leading Remote Support solution. From the /login search functionality Read More
18 Oct 2022News.Qualys CISA BOD 23-01: Meeting and Exceeding CISA Requirements with QualysThe latest Binding Operational Directive from the Cybersecurity and Infrastructure Security Agency (CISA) BOD 23-01 requires agencies to Read More
18 Oct 2022News.Riverbed AIOps and Observability: What’s the Difference? | RiverbedInterest in AIOps and observability tools sky-rocketed over the past couple of years as IT teams face the challenge of managing today’s IT Read More
16 Oct 2022News.ThreatQuotient Anticipation and Action: What’s Next in SOC Modernization“Wisdom consists of the anticipation of consequences.” – Norman Cousins In the cybersecurity industry, we’ve Read More
15 Oct 2022Forcepoint.News The Increasingly Complex Threat Landscape Must be Fought with SimplicityIndeed, new research from Forcepoint found 65% of U.K. and U.S. CNI organizations have fallen victim to a cyberattack and 57% to a ransomware Read More
11 Oct 2022News.Titus “See Yourself in Cyber” and Stay Ahead of Cybersecurity Threats – Cybersecurity Awareness Month 2022Home » Titus Blog » “See Yourself in Cyber” and Stay Ahead of Cybersecurity Threats – Cybersecurity Awareness Month 2022 HelpSystems Webmaster Read More
11 Oct 2022Forcepoint.News CISA Directive: Federal Agencies Must Improve Cybersecurity Asset Visibility and Vulnerability DetectionCISA states the directive supports many other mandates and guidance that has previously been established, including the Executive Order 14028 on Read More
11 Oct 2022News.Qualys In-Depth Look Into Data-Driven Science Behind Qualys TruRiskVulnerability Management is a foundational component of any cybersecurity program for the implementation of appropriate security controls and the Read More
9 Oct 2022News.Press releases.ThreatQuotient Help Enable Smarter Decisions During Cybersecurity Awareness MonthHelp Enable Smarter Decisions During Cybersecurity Awareness Month Noor Boulos Do a quick search for the top cybersecurity breaches thus far in Read More
8 Oct 2022Forcepoint.News Inside the James Webb Attack ImageAppending data to an image is a well-known way of hiding malware. In this case, the executable data is Base64 encoded and surrounded by markers Read More
4 Oct 2022BeyondTrust.News.Webinars Cyber Claims: The Real Role of Forensic Analysis | BeyondTrustWhat is a Cyber Claim? A cyber claim is how a cyber insurance policy – insuring against ransomware, malware, cyber breaches, etc. – is Read More
4 Oct 2022News.Qualys WhatsApp Fixed Critical Vulnerabilities that Could Let an Attacker Hack Devices Remotely – Automatically Discover and Remediate Using VMDR MobileWhatsApp has recently fixed critical and high-severity vulnerabilities affecting WhatsApp for Android, WhatsApp Business for Android, WhatsApp Read More
3 Oct 2022News.Riverbed Digital Experience Alphabet Soup | RiverbedMeasuring and improving the digital experience of employees and customers has risen in priority over the past couple of years. Several factors Read More
2 Oct 2022News.Press releases.ThreatQuotient Unlock the Power of Automation: Vulnerability ManagementUnlock the Power of Automation: Vulnerability Management Dave Krasik We’ve spoken extensively about the importance of taking a data-driven Read More
1 Oct 2022Forcepoint.News Forcepoint at GITEX Global 2022 in Dubai Beginning 10 OctoberDuring this year’s GITEX, we’ll have lots of things planned throughout the show. At our booth in Hall 2 Stand A30, we’ll have product experts Read More
27 Sep 2022Forcepoint.News An Update on Forcepoint’s Digital Customer Engagement Journey1) The accelerated shift to cloud applications and 2) The need to protect workers and data regardless of location. Through that evaluation, a Read More
27 Sep 2022BeyondTrust.News 10 Common Social Engineering AttacksWhat is Social Engineering? Also known as “human hacking,” social engineering attacks use psychologically manipulative tactics to influence a Read More
27 Sep 2022News.Qualys Why Organizations Struggle with Patch Management (and What to Do about It)The cybersecurity attack surface continues to grow exponentially. Modern technologies are being deployed on-premises and in the cloud as part of Read More
26 Sep 202226 Sep 2022Educate yourself about Cybersecurity.Netwrix.News Full-scale Identity and Access Governance Solution from Netwrix + Portfolio overviewRead More
25 Sep 2022News.ThreatQuotient How Organizational Structure, Personalities and Politics Can Get in the Way of SecurityCyberattacks and data breaches continue to rise year-over-year and another so-called silver bullet technology isn’t going to stop that Read More
24 Sep 2022Forcepoint.News Protecting a Hot Wallet ServiceWhile you can open a cash wallet with your hands, to use a digital wallet you need a computer. The digital wallet might just be some data, and Read More
23 Sep 2022Micro Focus.News September’s Month of Volunteering: How Our Actions Today, Impact TomorrowAt Micro Focus, September is our INSPIRE Month of Volunteering. Inclusion is at the heart of the INSPIRE program, and through our volunteering Read More
20 Sep 2022News.Titus Guarding Against Insider ThreatsHelpSystems Webmaster · Thursday, September 15th, 2022 When you see or hear the term “data breach” in the media, is the first thought Read More
20 Sep 2022BeyondTrust.News Top IoT Security Risks and Vulnerabilities and How to Mitigate Them | BeyondTrustIoT is now pervasive and often represents a security weak link in enterprises. It’s far past time for organizations to account for IoT as part of Read More
20 Sep 2022News.Qualys September 2022 Patch Tuesday | Microsoft Releases 63 Vulnerabilities with 5 Critical, plus 16 Microsoft Edge (Chromium-Based); Adobe Releases 7 Advisories, 63 Vulnerabilities with 35 Critical.Microsoft has fixed 63 vulnerabilities (aka flaws) in the September 2022 update, including five (5) vulnerabilities classified as Critical as Read More
18 Sep 2022News.ThreatQuotient Sesame IT chooses ThreatQuotient to ensure its clients receive high quality Threat IntelParis, 13th September 2022 – threat detection specialist Sesame IT has teamed up with ThreatQuotient™ – a pioneer in threat Read More
18 Sep 2022News.Riverbed Alluvio IQ: Solve Problems Fast at Any IT Skill LevelIT has a problem–well, quite a few problems. Monitoring tools are supposed to help network teams find and fix tech problems, but all too Read More
17 Sep 2022Forcepoint.News Uber Hack – What we know so farInside the internal intranet were some PowerShell scripts that the attacker supposedly used to access core services such as AWS, Slack and Read More
16 Sep 2022Micro Focus.News Micro Focus Sponsors Grace Hopper Celebration 2022Micro Focus is proud to be part of the Grace Hopper Celebration to help shape a more inclusive and gender-balanced technology industry – while Read More
13 Sep 2022News.Titus The Magical Implementation – Awareness, Safety Crews, and Plans for Potentially Dangerous StuntsHome » Titus Blog » The Magical Implementation – Awareness, Safety Crews, and Plans for Potentially Dangerous Stunts Dana McMullan · Read More
13 Sep 2022BeyondTrust.News Insider Threat Indicators: How to Identify & Mitigate Insider Attacks | BeyondTrustWhat is an insider threat? An insider threat is an internal persona acting as a trusted asset (employee, contractor, vendor, partner, etc.) Read More
13 Sep 2022News.Qualys Let Smart Automation Reduce the Risk of Zero-Day Attacks on Third-Party ApplicationsLast week, Google released yet another zero-day patch for its Chrome browser to fix a high-severity flaw that was already being exploited. That Read More
11 Sep 2022News.Press releases.ThreatQuotient Unlock the Power of Security Automation: Threat Intelligence ManagementUnlock the Power of Security Automation: Threat Intelligence Management Chris Jacob Threat intelligence has become a significant input to the Read More
10 Sep 2022Forcepoint.Gartner.News Forcepoint at the Gartner Security & Risk Management Summit Next WeekThe trend is clear—companies continue to invest more in cybersecurity products and solutions. And chances are good that your organization has Read More
6 Sep 2022Forcepoint.News Understanding the Interconnectedness of Cybersecurity and PrivacyThese events are reminders of how globally interconnected our networks, supply chains and daily lives have become. More than one-half of the Read More
6 Sep 2022BeyondTrust.News When Clickbait Goes BadEveryone makes mistakes, but when something as simple as a single click can have ruinous impacts on your identity, your bank account, and your Read More
6 Sep 2022News.Qualys Introducing Qualys Threat Research ThursdaysWelcome to the first edition of the Qualys Research Team’s “Threat Research Thursday” where we collect and curate notable new tools, techniques, Read More
5 Sep 2022Micro Focus.News What Does Strategic Transformation Mean for Your Business?Strategic transformation can take many forms and address myriad business challenges. In his third installment of his “How to Run and Transform” Read More
4 Sep 2022News.Press releases.ThreatQuotient Unlock the Power of Security Automation: 3 Use Cases to ConsiderUnlock the Power of Security Automation: 3 Use Cases to Consider Leon Ward At ThreatQuotient, we write a lot about security automation. Most Read More
3 Sep 2022Forcepoint.News The Answer to the Zero Trust ChallengeIt’s time to pivot from relying on detection alone. With Zero Trust CDR you can eliminate threats before they enter and prevent data loss via Read More
3 Sep 2022News.Riverbed Improve Your Employee’s Experience With MS Teams, Alluvio | RiverbedAlluvio can show the number calls with high latency, jitter, and packet loss out of total the calls made. You can easily identify the call Read More
30 Aug 2022BeyondTrust.News Cisco Breach – A Cautionary Tale of Mismanaged Credentials & Privileged Identities | BeyondTrustOn the 10th of August 2022, Cisco confirmed they had been breached by the Yanluowang ransomware group. On the same day, the Yanluowang group Read More
30 Aug 2022News.Qualys Mitigating the Risk of Zero-Day Vulnerabilities by using Compensating ControlsZero-day vulnerability attacks have emerged as a major cybersecurity threat in the last few years. Organizations most often targeted include Read More
28 Aug 2022News.Press releases.ThreatQuotient As the Cyber Threat Environment Escalates, How are Organizations Responding?As the Cyber Threat Environment Escalates, How are Organizations Responding? Cyrille Badeau Globally, the cyber threat level to organizations Read More
27 Aug 2022News.ThreatMark New Phishing Campaign IdentifiedOn August 4th, 2022 we discovered and confirmed an active phishing campaign targeting users of multiple major European banks from a single web Read More
27 Aug 2022Forcepoint.Gartner.News Eliminating Zero Trust ComplexityThis isn’t the first time the federal government has been mandated to strengthen cybersecurity programs. Back in 2002 and later amended in Read More
26 Aug 2022Micro Focus.News Is Digital Transformation a Trap?It’s planning time for a new fiscal year, and IT organizations are hearing the words “digital transformation” with great frequency. In a new Read More
23 Aug 2022News.Titus The CMMC ProgramHelpSystems Webmaster · Thursday, August 18th, 2022 As the number of new data privacy regulations and programs coming into effect in the Read More
23 Aug 2022BeyondTrust.News One-Time Password (OTP) Solutions for Privileged Access | BeyondTrustWhat are one-time passwords? A one-time password (OTP) is the password used in a credential pair that is valid for only one login session or Read More
23 Aug 2022Gartner.News.Skyhigh Security The customers have spoken | Gartner ‘Voice of the Customer’ ReportRead More
23 Aug 2022News.Qualys Qualys VMDR Recognized as Best VM Solution by SC Awards 2022 & Leader by GigaOmQualys VMDR has been recognized for its commanding industry leadership by both the 2022 SC Awards and analyst firm GigaOm. SC Magazine has Read More
21 Aug 2022News.Press releases.ThreatQuotient Breaking Barriers at Black Hat 2022 with Women in CybersecurityBreaking Barriers at Black Hat 2022 with Women in Cybersecurity Kasey Ello Women in Cybersecurity Happy Hour at Black Hat 2022 After more than Read More
18 Aug 2022News.Riverbed 6 Proven Strategies to Protect Networking Teams from Burnout | RiverbedIs your team feeling overworked, undervalued and frustrated? You’re not alone—the pandemic has put more pressure on almost all of us, especially Read More
16 Aug 2022BeyondTrust.News.Webinars How to Mitigate the Windows DogWalk Vulnerability | BeyondTrustThe Windows DogWalk vulnerability (CVE-2022-34713) presents a prime reminder of why a proactive approach to endpoint security is so important. Read More
16 Aug 2022News.Qualys Qualys Security Updates: Cloud Agent for LinuxThe security and protection of our customers is of the utmost importance to Qualys, as is transparency whenever issues arise. A customer Read More
14 Aug 2022News.Press releases.ThreatQuotient Cover these five topics before going forward with an M&AThe S&P Global 451 Research Tech M&A Outlook Survey found that the value of technology deals announced in 2021 exceeded $1 trillion for Read More
13 Aug 2022Forcepoint.News Mind the Gap – Security at the IT/OT BoundaryData Extraction 68% of business leaders feel their cybersecurity risks are increasing.” In normal operations, networked machines are capable of Read More
9 Aug 2022BeyondTrust.News 10 Must-Have Certifications for IT Support ProfessionalsWhat is an IT Support Certification? IT support certifications are recognized acknowledgements of specific experience, knowledge, and skills Read More
9 Aug 2022News.Qualys A Deep Dive into VMDR 2.0 with Qualys TruRisk™The old way of ranking vulnerabilities doesn’t work anymore. Instead, enterprise security teams need to rate the true risks to their business. In Read More
8 Aug 2022Micro Focus.News Why AI is Essential for Value Stream ManagementIn the second installment of his “How to Run and Transform” blog series, Achmad Chadran reviews how Value Stream… View Article Read More
7 Aug 2022News.ThreatQuotient The Secret to Automation? Eat the Elephant in Chunks.The goal of security automation is to accelerate detection and response, but you’ll waste a lot of time if you try to eat the elephant all Read More
6 Aug 2022Forcepoint.Gartner.News Meeting 2024 Federal Zero Trust DeadlinesIn the recent report entitled “The Quest for Zero Trust,” presented by Fedscoop and sponsored by Forcepoint, researchers examined Read More
3 Aug 20223 Aug 2022News Adria Security Summit Powered by Intersec Returns to Zagreb as a Timely and Welcome GuestRead More
2 Aug 2022News.Titus The Magical Implementation – Picking the Right Assistant(s)Home » Titus Blog » The Magical Implementation – Picking the Right Assistant(s) Dana McMullan · Wednesday, July 20th, 2022 A magical and Read More
2 Aug 2022BeyondTrust.News The Power of Good Server and Endpoint Naming Conventions | BeyondTrustEndpoint & Server Naming – Standards Needed When I first started in information technology, one of the more humorous aspects was the Read More
2 Aug 2022News.Qualys Here’s a Simple Script to Detect the Stealthy Nation-State BPFDoorIn this blog, the Qualys Research Team explains the mechanics of a Linux malware variant named BPFdoor. We then demonstrate the efficacy of Read More
31 Jul 2022News.Press releases.ThreatQuotient Looking for Some Summer Reading? Check Out Our Top Blogs so Far this YearLooking for Some Summer Reading? Check Out Our Top Blogs so Far this Year Kasey Ello Summertime often means vacation time and a chance to rest, Read More
30 Jul 2022Forcepoint.News.Webinars Malware evolves constantly. Your security should too.Every minute, four companies fall victim to ransomware attacks.” In fact, here’s what DataProt said in a recent report: Is your Read More
26 Jul 2022Forcepoint.News Ukraine and Beyond: A ‘To The Point Cybersecurity’ Podcast RecapHere’s a quick look at some of the key insights from recent episodes: Over the past few months, a range of experts have weighed in on these Read More
26 Jul 2022BeyondTrust.News.Webinars Linux Attack & Defense: Matrix Breakout Edition | BeyondTrustAs a penetration tester, I enjoy playing the Capture the Flag (CTF) challenges you’ll find on VulnHub.com or at an information security Read More
26 Jul 2022News.Qualys Integrating JIRA to the Qualys Cloud PlatformThis is the second in a blog series on integrations to the Qualys Cloud Platform. This post looks at what are the requirements to build a Read More
24 Jul 2022Gartner.News.Press releases.ThreatQuotient Security Automation, Lessons Learned from Top Gun: MaverickSecurity Automation, Lessons Learned from Top Gun: Maverick Marc Solomon The cybersecurity industry has talked about security automation for Read More
23 Jul 2022Forcepoint.News The Evolution of CybersecurityWe can’t control it, but we can evolve our thinking, our philosophy, our program and our architecture.” We can’t fall into old habits and try to Read More
19 Jul 2022News.Titus Understanding and Protecting CUIHelpSystems Webmaster · Thursday, July 14th, 2022 The ever-increasing ability to share information is a double-edged sword. On the one Read More
19 Jul 2022BeyondTrust.News AWS Root vs IAM User: What to Know & When to Use Them | BeyondTrustIn Amazon Web Services (AWS), there are two different privileged accounts. One is defined as Root User (Account owner) and the other is defined Read More
19 Jul 2022News.Qualys July 2022 Patch Tuesday | Microsoft Releases 84 Vulnerabilities with 4 Critical, plus 2 Microsoft Edge (Chromium-Based); Adobe Releases 4 Advisories, 27 Vulnerabilities with 18 Critical.Microsoft has fixed 84 vulnerabilities (aka flaws) in the July 2022 update, including four (4) vulnerabilities classified as Critical as they Read More
18 Jul 2022News.Riverbed Digital Experience Innovation & AccelerationIT für eine erfolgreiche Digitalisierung und Cloud-Migration modernisieren Um von digitalen und cloudbasierten transformativen Technologien zu Read More
17 Jul 2022News.ThreatQuotient The Pendulum Effect and Security AutomationThe last few years have been filled with examples of the “Pendulum Effect”, where trends swing from one extreme to another before Read More
16 Jul 2022Forcepoint.News Forcepoint Classification powered by Getvisibility combines AI-enhanced classification with award-winning DLPApplying AI for accuracy, automation and efficiency While many competing data classification solutions make limited use of machine learning, they Read More
12 Jul 2022Forcepoint.Gartner.News Reflecting on (One of) Gartner’s Cybersecurity PredictionsOne of the stand outs across the eight predictions: Late last month, Gartner released its top eight cybersecurity predictions for 2022-23, Read More
12 Jul 2022BeyondTrust.News Top 15 Password Management Best Practices | BeyondTrustThis blog has been updated with new data and insights since it was originally published on August 2, 2019. Think passwords will soon be dead? Read More
12 Jul 2022News.Qualys About CMDB Sync Integration with Qualys CyberSecurity Asset ManagementWelcome to the first in a new series of blog posts about Qualys integrations. This first blog in the series covers our integrations as they Read More
10 Jul 2022News.Press releases.ThreatQuotient The Meaning of OrchestrationThe Meaning of Orchestration Vicki Lemay Recently, ThreatQuotient hosted an interactive discussion regarding security orchestration and cyber Read More
9 Jul 2022Forcepoint.News ZTNA is key to securing the hybrid workforceSo why does all this matter? It’s important because many Zero Trust security strategies don’t fully address how the full range of users interact Read More
5 Jul 2022BeyondTrust.News Introduction from BeyondTrust’s New CEO: Janine Seebeck | BeyondTrustToday is an exciting day for me personally and for BeyondTrust, as I officially assume the role of CEO. After six years in leadership roles at Read More
5 Jul 2022News.Qualys Atlassian Confluence OGNL Injection Remote Code Execution (RCE) Vulnerability (CVE-2022-26134)On June 02, 2022, Atlassian published a security advisory about a critical severity Unauthenticated Remote Code Execution vulnerability affecting Read More
3 Jul 2022News.Press releases.ThreatQuotient.Webinars The Current State of Intelligent Automation Adoption in CybersecurityThe Current State of Intelligent Automation Adoption in Cybersecurity Cyrille Badeau In the past year, research indicates that nearly a third of Read More
3 Jul 2022News.Riverbed Digital Experience Innovation & AccelerationIT für eine erfolgreiche Digitalisierung und Cloud-Migration modernisieren Um von digitalen und cloudbasierten transformativen Technologien zu Read More
2 Jul 2022Forcepoint.News Insider Risk and the Great Resignation: Preventing Critical Data Loss When Employees LeaveHere are some sobering facts about the risks of departing employees: The ex-Pfizer employee is one of tens of millions of people around the world Read More
30 Jun 2022Educate yourself about Cybersecurity.News.Skyhigh Security.Vendors What Is Security Service Edge (SSE)?Read More
29 Jun 2022Educate yourself about Cybersecurity.News.Trellix.Vendors What Is Extended Detection and Response (XDR)?Read More
28 Jun 2022BeyondTrust.News The Dark Side of Microsoft WindowsThere is no denying that Microsoft Windows has a clear market advantage when it comes to their IT ecosystems. No other vendor has produced a Read More
28 Jun 2022News.Qualys Risk-based Remediation Powered by Patch Management in Qualys VMDR 2.0According to the recently released Verizon DBIR report, vulnerability exploitation continued to be one of the top three attack vectors exploited Read More
26 Jun 2022News.ThreatQuotient Security Orchestration: Beware of the Hidden Financial CostsAmong the many improvements in cybersecurity technology and tools we’ve seen over the last few years, one of the most significant has been Read More
25 Jun 2022Forcepoint.News The Next Generation of CDR TechnologyIntroducing the Next Generation of CDR! Not any more… Zero trust + CDR = Zero Trust CDR. Zero Trust CDR mitigates the threat of even the Read More
21 Jun 2022News.Titus Data Classification in the Finance WorldHelpSystems Webmaster · Monday, June 20th, 2022 When it comes to data privacy, financial services is one of the most highly regulated Read More
21 Jun 2022BeyondTrust.News Unix/Linux Privilege Management: Should You Sudo? Here’s What It Does and Why It’s Not Enough | BeyondTrustIn this blog, I will introduce you to sudo and su, two of the most important and most often used commands in Linux, and talk about the basic pros Read More
21 Jun 2022News.Qualys Defending Against Scheduled Task Attacks in Windows EnvironmentsScheduling tasks is one of the most popular attack techniques used by threat actors to establish persistence on a victim’s machine. The Qualys Read More
19 Jun 2022News.ThreatMark Automated phishing site takedown with Namecheap and ThreatMark API integrationPhishing is the scourge of the modern digital era. Verizon’s Data Breach Investigations Report notes that over 82% of data breaches include the Read More
19 Jun 2022News.ThreatQuotient ThreatQuotient Recognized as a 2022 Top Place to Work by The Washington PostProvider of security operations solutions stands out for excellent workplace culture that has contributed to industry recognition for the Read More
18 Jun 2022Forcepoint.News The Million-Dollar Question in 2022In a world where you can work from anywhere (and everyone knows it!), what keeps a person where they are or intrigues them to look Read More
14 Jun 2022BeyondTrust.News Windows Follina Vulnerability MitigationOn May 27th 2022, a new zero-day remote code execution (RCE) vulnerability (CVE-2022-30190P) was discovered in the Microsoft Support Diagnostic Read More
14 Jun 2022News.Qualys Close the Gap Between IT & Security with Our New App: Qualys VMDR for ITSMIn recent years, the world has seen an alarming rise in cyber-attacks. According to the just released Verizon DBIR report, the rate of increase Read More
12 Jun 2022News.Press releases.ThreatQuotient Reduce Time Or Do Not, There Is No ShiftReduce Time Or Do Not, There Is No Shift Dave Krasik In previous blog posts we’ve discussed the value of a data-driven approach to security Read More
11 Jun 2022Forcepoint.News.Webinars Webinar: Don’t Miss The Quickest Proof of Concept Ever! Zero Trust CDR vs MalwareThe technology is so quick and effective, that it takes us as little as 10 minutes to show you how it works. Don’t believe us? Join Aaron Read More
7 Jun 2022Forcepoint.News Are you SURE your security platform is helping your business?In short, most security products focus on “what” they’re doing rather than what they’re doing for you. That’s backwards. Nobody deploys security Read More
7 Jun 2022BeyondTrust.News BeyondTrust and the NASCIO 2022 Midyear ConferenceLast month saw the successful completion of the NASCIO 2022 Midyear Conference, which provides an opportunity for CIOs, top IT officials, and Read More
7 Jun 2022News.Qualys Introducing Qualys VMDR 2.0Over the last five years, the number of vulnerabilities disclosed has doubled. The speed at which vulnerabilities are weaponized and leveraged Read More
5 Jun 2022News.ThreatQuotient Automation. Where do We Go from Here?What’s next in the evolution of security automation and orchestration? Over the past 20 years we’ve seen significant improvements in Read More
4 Jun 2022Forcepoint.Gartner.News Catch Up with Forcepoint at RSAC 2022Hear from our CEO and our Global CTO On June 8, 11:10am PT, come watch a keynote session with our CEO, Manny Rivelo, on Security’s Dirty Little Read More
31 May 2022Forcepoint.News Defeating a brand new Microsoft Office zero-day attack with ZT CDRInitially, at the time of writing, only five of sixty vendors available marked this file, now known as CVE-2022-30190, as malicious. And as of Read More
31 May 2022BeyondTrust.News Cybersecurity Requirements: How Define Them & Map to the Right ProductWe’ve probably all heard what’s important when buying a house, “Location, Location, Location”, but what’s most important when buying a Read More
31 May 2022News.Qualys Qualys FIM: Be Compliance Ready with Intuitive, Ready-to-Use File Monitoring ProfilesRequirements for file-level security are often set by laws, regulations, and audit standards. These include identification of what must be Read More
29 May 2022News.Press releases.ThreatQuotient Taking a Data-Driven Approach to SOC OperationsTaking a Data-Driven Approach to SOC Operations LEON WARD Today’s escalating threat landscape means that security operations teams face a Read More
29 May 2022News.Press releases.ThreatQuotient Taking a Data-Driven Approach to SOC OperationsTaking a Data-Driven Approach to SOC Operations LEON WARD Today’s escalating threat landscape means that security operations teams face a Read More
24 May 2022Forcepoint.News.Webinars Successfully Migrating to an SSE PlatformWhile it’s fair to say migrating to a new, unified security SSE platform requires a bit of planning, it’s clear that a successful implementation Read More
24 May 2022BeyondTrust.News What is an Open Port & What are the Security Implications? | BeyondTrustWhat are ports? A port is a software-defined value that identifies a network endpoint. Any connection made on a TCP/IP network has a source and Read More
24 May 2022News.Qualys Put SecOps in the Driver’s Seat with Custom Assessment and RemediationWhen zero-day threats emerge, time is of the essence. Security teams struggle to manage and respond to a range of challenges that often require Read More
21 May 2022Forcepoint.News Cyber Threat Fatigue: A To The Point Cybersecurity Podcast RecapFor security practitioners feeling overwhelmed by the growing threat landscape, these episodes offer a shortcut to prioritizing some of the most Read More
19 May 202219 May 2022Logrhythm.Vendors LogRhythm Partners with REAL security to Enable Enterprises in the Adriatic Region to Detect and Respond to CyberthreatsRead More
17 May 2022News.Titus Data Classification: The Impact on a Zero Trust FrameworkHelpSystems Webmaster · Thursday, May 12th, 2022 At first glance, it appears that data classification and Zero Trust, a cybersecurity Read More
17 May 2022BeyondTrust.News What is IT Support? Technical Support Tools and Service Desk Explained3. Lack of training This challenge has two parts to it. First, there is a lack of end-user training that creates more demand on the IT Read More
17 May 2022News.Qualys How to Get Useful Monitoring of File-level SecurityFile integrity monitoring (FIM) tools are essential for defending business and customer data, but legacy tools are falling short by swamping Read More
15 May 2022News.Press releases.ThreatQuotient ThreatQuotient France : Christophe Varin est nommé au poste de Regional Sales ManagerParis le 12 mai 2022, ThreatQuotient™, pionnier sur le marché du renseignement sur la menace et des plateformes Read More
14 May 2022Forcepoint.Gartner.News What Do Customers Say About Forcepoint Secure SD-WAN?Forcepoint Secure SD-WAN In fact, Gartner analysts believe that by 2025, four out of every five companies will have a strategy in place to unify Read More
10 May 2022Forcepoint.News An Analysis of Dangerous CurvesIn a more idealized world, software that supports ECC in certificates would mandate the use of configurations that are known to be safe, and Read More
10 May 2022News.Qualys Ursnif Malware Banks on News Events for Phishing AttacksUrsnif (aka Gozi, Dreambot, ISFB) is one of the most widespread banking trojans. It has been observed evolving over the past few years. Ursnif Read More
8 May 2022News.Press releases.ThreatQuotient.Webinars Achieving Better Business Outcomes Through a CTI PracticeAchieving Better Business Outcomes Through a CTI Practice AMY DONOVAN According to Joshua Ray, managing director, Global Cyber Defense Lead, Read More
7 May 2022Forcepoint.News.Webinars Forcepoint and IDC Webinar: Data Loss Prevention – Top Trends of 2022Manual and arcane classification techniques are being replaced by machine learning and automation. The past 24 months have seen a renaissance in Read More
3 May 2022BeyondTrust.News.Webinars Zero Trust and Passwordless Authentication | BeyondTrustCybersecurity is not an industry that is synonymous with fashion. We have never had an iPhone moment before; that point when a smart, sparkly new Read More
2 May 2022News.PROFITAP Profitap IOTA v2.3.0 Release NotesThe newly released IOTA software version 2.3.0 includes the following new features: Added VoIP support to traffic flow analysis and Read More
1 May 2022News.Press releases.ThreatQuotient XDR best of breed, and how an open architecture will get you thereXDR best of breed, and how an open architecture will get you there ED YOUNG The security landscape is continually changing and the race to stay Read More
30 Apr 2022Forcepoint.News.Webinars Forcepoint Brings Personalized Automation at Scale to DLPMay 4 Webinar Today Forcepoint is delivering greater personalization and automation to DLP policy enforcement while also directly addressing the Read More
26 Apr 2022Forcepoint.News SWG: The Third Key Component of an SSE PlatformAs part of the Forcepoint ONE SSE platform, our SWG can use the same advanced threat protection and data security technologies that our Cloud Read More
26 Apr 2022BeyondTrust.News Applying Access Control Lists in the CloudWhat is an Access Control List? An Access Control List (ACL) provides a security mechanism to define who or what has access to your assets, Read More
26 Apr 2022News.Qualys Assessing Certificate Risk with Qualys VMDRDigital certificates and SSL are everywhere. However, managing an accurate inventory of all current certificates in use across your enterprise is Read More
24 Apr 2022News.ThreatQuotient When Attacks Surge, Turn to Data to Strengthen Detection and ResponseNews of cyber criminals and nation-state actors capitalizing on events, planned or unplanned, for financial gain or to wreak havoc have dominated Read More
19 Apr 2022BeyondTrust.News The Axeda Vulnerability and Lessons Learned | BeyondTrustIn March, a vulnerability that impacts Parametric Technology Corporation’s (PTC) Axeda agent and Axeda Desktop Server was announced. The Read More
19 Apr 2022News.Qualys April 2022 Patch Tuesday: Microsoft Releases 145 Vulnerabilities with 10 Critical; Adobe Releases 4 Advisories, 78 Vulnerabilities with 51 Critical.Microsoft Patch Tuesday Summary Microsoft has fixed 145 vulnerabilities, including 17 Microsoft Edge vulnerabilities, in the April 2022 update, Read More
17 Apr 2022News.Press releases.ThreatQuotient The role of Threat Intelligence Platforms in Implementing Extended Detection and ResponseThe role of Threat Intelligence Platforms in Implementing Extended Detection and Response GIGI SCHUMM As the new year continues to unfold, Read More
16 Apr 2022Forcepoint.News SSE Platforms are Bringing ZTNA to the MainstreamWith ZTNA, users no longer have to remember when to start their VPN—and wrestle with restarting it when it fails. And, by not having a VPN that Read More
15 Apr 2022Micro Focus.News Recapping Run and TransformThe exciting Micro Focus Universe 2022 conference showcased Micro Focus’ Run and Transform narrative. Derek Britton reflects on what… Read More
13 Apr 202213 Apr 2022News.Skyhigh Security.Tech Best Practices 2022 Gartner® Magic Quadrant™ Leader for Security Service EdgeRead More
13 Apr 202213 Apr 2022Skyhigh Security.What's new in ITSec world McAfee Enterprise SSE business relaunched as Skyhigh SecurityRead More
12 Apr 2022News.Titus What is India’s Personal Data Protection Bill?The EU’s GDPR paved the way for data privacy and protection laws around the world, and one of the latest is the emerging Personal Data Protection Read More
12 Apr 202213 Apr 2022News.Skyhigh Security.What's new in ITSec world The Forrester Wave™: Cloud Workload Security, Q1 2022Read More
12 Apr 2022BeyondTrust.News What is Vendor Privileged Access Management (VPAM)?Securing Vendor Identities & Access Vendor Privileged Access Management (VPAM) enables vendor identities to securely access an organization’s Read More
10 Apr 2022News.Press releases.ThreatQuotient Tax Season Scams Are Here Again – How to Mitigate RiskTax Season Scams Are Here Again – How to Mitigate Risk AARON LOUKS Ransomware has dominated the headlines the last couple of years. But it Read More
9 Apr 2022Forcepoint.News How Three Forcepoint Customers Use DLP for a Competitive AdvantageBut securing it from insider threats and external attacks isn’t easy. Information comes in all shapes and sizes, it’s stored far and wide, and it Read More
5 Apr 2022Forcepoint.Gartner.News SSE Platforms are Taking CASB to the Next LevelTake, for example, the Cloud Access Security Broker (CASB) capabilities within Forcepoint ONE. Drawing on technology that was a 3-time leader in Read More
5 Apr 2022BeyondTrust.News.Webinars How to Prepare for 2022 Cyber Insurance Renewals and What to Expect | BeyondTrustCyber insurance premiums in 2021 continued to climb to record highs, spurned by a significant spike in successful cyberattacks. According to the Read More
5 Apr 2022News.Qualys EDR Is Dead. Long Live Multi-Vector EDR.News of EDR’s demise has been greatly exaggerated. Fact is: older approaches to EDR have to move over. There’s a new solution now: Multi-Vector Read More
3 Apr 2022News.ThreatQuotient The Importance of Open Source to an XDR ArchitectureNo longer satisfied with infecting files or systems, adversaries are now intent on crippling entire enterprises. Damaging supply chain, Read More
2 Apr 2022Forcepoint.News Apple and Meta targeted with forged legal data requests, Triton malware still targeting energy firms, Hackers use MFA tool against Indian government, FBI warns election officials of phishing attacks, Kaspersky poses national security risk, moreApple and Meta reportedly provided customer data to hackers in response to forged ’emergency data requests.’ Triton malware still Read More
2 Apr 2022News.PROFITAP X2-Series v0.10.0 Release NotesThe newly released X2-Series software version 0.10.0 includes the following: PTPv2 Time Synchronization for Nanosecond Traffic Timestamping MPLS Read More
29 Mar 2022News.Titus Dark Data: Out of Sight, Out of MindElizabeth Swabey-Keith · Wednesday, March 23rd, 2022 Businesses are creating and collecting more data than ever. Far too much of this Read More
29 Mar 2022BeyondTrust.News Marc Maiffret’s ModernCTO Conversation: An FBI Raid, Free Mountain Dew, & Security Culture | BeyondTrustMarc Maiffret, CTO of BeyondTrust, recently sat down with Joel Beasley, the author of ModernCTO and host of the ModernCTO podcast, to discuss Read More
29 Mar 2022News.Qualys Implications of Windows Subsystem for Linux for Adversaries & Defenders (Part 1)This post is the first of a multi-part blog series that will explore and highlight the different risks that Windows Subsystem for Linux (WSL) Read More
27 Mar 2022News.ThreatQuotient Women in cybersecurity careers: 3 strategies to boost gender inclusionReston, Virginia-based ThreatQuotient’s Gigi Schumm makes the case for promotion transparency and bias awareness. The business case for Read More
26 Mar 2022Forcepoint.News Forcepoint ONE Demo Series – ZTNA for private web apps use casesForcepoint ONE On-Demand Demo Watch the Webcast To bring this to life, Shane Moore demonstrates how easy it is to use the ZTNA for both end users Read More
22 Mar 2022BeyondTrust.News Azure AD Security Best Practices Explored | BeyondTrustOf course, it’s a cloud-based product, SaaS-based product, that fully audits itself. Does this idea of continuous discovery. So just like Read More
22 Mar 2022News.Qualys Infographic: Log4Shell Vulnerability Impact by the NumbersThe full scope of risk presented by the Log4Shell vulnerability is something unprecedented, spanning every type of organization across every Read More
20 Mar 2022News.Press releases.ThreatQuotient Women in Cybersecurity – Lavanya RajWomen in Cybersecurity PROFILE – LAVANYA RAJ Lavanya RajThreatQuotient – Senior QA Engineer What do you do at ThreatQuotient?I Read More
19 Mar 2022Forcepoint.News Forcepoint ONE Demo Series – SWG Use CaseKey features demonstrated: To bring these use cases to life, Shane Moore demonstrates how easy it is to use the Forcepoint ONE SWG for both end Read More
19 Mar 2022Certgate AirID FIDO – New wireless, secure Passwordless AuthenticationNew AirID FIDO security key enables wireless, Passwordless Authentication for PC, tablet and online services for the first time. MICROSOFT, OKTA, Read More
18 Mar 2022News.Riverbed Hybrid Work Global Survey 2021 | Riverbed | AternityHybrid work is the new norm and critical to organizational success—but the question is, are you ready to support the hybrid workplace? To assess Read More
15 Mar 2022Forcepoint.News Securing collaboration in a multi-cloud Zero Trust environmentSecurity and IT teams still remain challenged: How can I safely enable an internal application for a remote individual? How can I safely Read More
15 Mar 2022BeyondTrust.News Turbocharging your IT Service DeskIncrease Productivity, While Building a Foundation for More Automation and Innovation The demands on IT Service Management (ITSM) have never been Read More
15 Mar 2022News.Qualys Casdoor SQL Injection (CVE-2022-24124)On Jan 22, 2022, a high severity SQL Injection vulnerability was reported in Casdoor which affected versions before 1.13.1 release. The Read More
13 Mar 2022News.Press releases.ThreatQuotient Women in Cybersecurity – Gianna Whitver & Maria VelasquezWomen in Cybersecurity PROFILE – GIANNA WHITVER & MARIA VELASQUEZ Gianna Whitver & Maria VelasquezCybersecurity Marketing Read More
12 Mar 2022Forcepoint.News Forcepoint ONE Demo Series – CASB Use CaseTo bring this point to life, Forcepoint Vice President of Sales, SSE, Shane Moore, demonstrates how Forcepoint ONE is easy to use for both end Read More
8 Mar 2022Forcepoint.Gartner.News Elena Cerrada at IDC and IDG Cybersecurity Forum 2022At Forcepoint, we specifically address the aformentioned challenges by adhering to 2 strategic constructs. The first consists in simplifying Read More
8 Mar 2022BeyondTrust.News Recalibrating Your Data Security Model to Achieve Zero Trust for GoverThe Push to Zero Trust On May 12, 2021, President Joe Biden passed an executive order (EO) on cybersecurity requiring federal agencies migrate Read More
8 Mar 2022News.Qualys AvosLocker Ransomware Behavior Examined on Windows & LinuxAvosLocker is a ransomware group that was identified in 2021, specifically targeting Windows machines. Now a new variant of AvosLocker malware is Read More
6 Mar 2022News.Press releases.ThreatQuotient Women in Cybersecurity – Audrey LlorensWomen in Cybersecurity PROFILE – AUDREY LLORENS Audrey LlorensThreatQuotient – Senior Manager, International Marketing What do Read More
5 Mar 2022Forcepoint.Gartner.News SASE Security and the new Security Service Edge (SSE)What is SASE Security or SSE? Whether you call it SASE security or SSE, this unified approach to providing security as a service for people Read More
3 Mar 20223 Mar 2022Educate yourself about Cybersecurity.News.Webinars WEBINAR It’s NOT about SECURITY. It’s about RESILIENCY!Join us on CyberRes Webinar with Ramsés Gallego Strengthen Your Cyber Resilience on 15th of March 2022 From securing the industry value chain to Read More
3 Mar 2022News.Riverbed Determining If NetProfiler Is Oversubscribed | Riverbed BlogWhen your Riverbed NetProfiler is oversubscribed and out of capacity, it’s not providing a complete view of your network performance. The view is Read More
2 Mar 2022News.PROFITAP X2-Series v0.9.0 Release NotesThe newly released X2-Series software version 0.9.0 includes the following: Added support for Profitap Supervisor Authentication Improved Traffic Read More
1 Mar 2022News.Titus The Importance of Automation in Data ClassificationElizabeth Swabey-Keith · Wednesday, February 23rd, 2022 It’s no surprise to anyone that the amount of data that exists is rapidly Read More
1 Mar 2022Forcepoint.News Your Mission is Our Mission – Shields Up— Former U.S. CISA Director Christopher Krebs Worldwide government, defense industries, and critical infrastructure organizations are seeking to Read More
1 Mar 2022BeyondTrust.News Cybersecurity Preparedness in Face of Global Conflict | BeyondTrustThe invasion of Ukraine is a harrowing ordeal for anyone impacted by the conflict. While we hope the situation can be resolved without further Read More
1 Mar 2022News.Qualys Russia-Ukraine Crisis: How to Strengthen Your Security Posture to Protect against Cyber Attack, based on CISA GuidelinesCISA has created Shields-Up as a response to the Russian invasion of Ukraine. Qualys is responding with additional security, monitoring and Read More
28 Feb 202228 Feb 2022Case study.Forcepoint.News Do you enjoy a good cup of coffee from your espresso machine? Without Forcepoint that might be harder for some people – check out why!A Top Espresso Machine Maker Manages Firewalls Around the World Simply and Cost-Effectively with Forcepoint To ensure secure and affordable Read More
28 Feb 2022Educate yourself about Cybersecurity.News.RISK conference We’re on – RISK 2022 registrations are now open!Good old times, we are coming! We are eagerly awaiting the 1st and 2nd of June, when we will finally after 2 years have a privilege to host YOU Read More
28 Feb 202228 Feb 2022Extrahop.News.Tech Best Practices Build Resilience Amid Rising Risk of Russian CyberthreatsThe predicted invasion of Ukraine by Russian forces has begun, and with it, the risk of cyber warfare against Ukraine’s supporters has Read More
28 Feb 202228 Feb 2022Good to know.News.Radware Radware DDOS Emergency On-BoardingIn some Adriatic countries, customers start to see more threat activities including DDoS focused on banks and GOV organizations. We are proposing Read More
27 Feb 2022News.Press releases.ThreatQuotient 3 Steps Security Leaders Can Take Toward Closing the Skills GapMuch has been written about the Great Resignation as its impact is widespread. Sectors including hospitality, food, retail, Read More
26 Feb 2022Forcepoint.News Forcepoint ONE – Built on a Scalable Zero Trust FoundationComplexity is the main reason. But scalability and performance are also concerns for many. That’s why we’re excited to bring Forcepoint ONE to Read More
22 Feb 2022News.Titus Key Considerations in The Ever-Evolving Data Privacy Landscape – The Benefit of Layered SecurityHome » Titus Blog » Key Considerations in The Ever-Evolving Data Privacy Landscape – The Benefit of Layered Security HelpSystems Webmaster Read More
22 Feb 2022BeyondTrust.News An Analyst’s Take: The Essential 8 & Using Zero Trust to Avoid Compliance-as-a-Strategy | BeyondTrustIt’s old news now – the pandemic spurred a “quantum leap” in digital transformation. Yet, the fact remains, security has yet to catch up. Read More
22 Feb 2022News.Qualys Oh Snap! More Lemmings: Local Privilege Escalation Vulnerability Discovered in snap-confine (CVE-2021-44731)The Qualys Research Team has discovered multiple vulnerabilities in the snap-confine function on Linux operating systems, the most important of Read More
21 Feb 2022Gartner.McAfee.News.Webinars McAfee Enterprise SSE: Named a Leader In 2022 Gartner Magic Quadrant for SSERecognizing the significant role SSE is filling in cybersecurity, Gartner® has published its first ever Magic Quadrant report for SSE. We are Read More
20 Feb 2022Gartner.News.Press releases.ThreatQuotient.Webinars Combat Advanced Threats with a Multi-disciplinary Threat Intelligence ProgramCombat Advanced Threats with a Multi-disciplinary Threat Intelligence Program ALISON ADKINS Ransomware attacks on Colonial Pipeline, JBS Foods Read More
19 Feb 2022Forcepoint.Gartner.News Forcepoint (Bitglass) recognized by Gartner® as a Visionary in first-ever Magic Quadrant™ for Security Service Edge (SSE)Our SSE solution brings together the cloud-native platform developed by Bitglass (which joined the Forcepoint family in October 2021) with our Read More
15 Feb 2022News.Titus Key Considerations in The Ever-Evolving Data Privacy Landscape – The Biggest Risk to Your OrganizationHome » Titus Blog » Key Considerations in The Ever-Evolving Data Privacy Landscape – The Biggest Risk to Your Organization HelpSystems Webmaster Read More
15 Feb 2022Forcepoint.News An Analysis of Software Supply Chain AttacksIntentional Software Flaws?Security has always been about making sure what shouldn’t happen doesn’t happen. It means proving that something bad Read More
15 Feb 2022BeyondTrust.News KuppingerCole Review of Cloud Privilege Broker – A CIEM SolutionRecently, analyst research firm KuppingerCole released their Executive Review: Cloud Privilege Broker report, exploring BeyondTrust’s debut into Read More
15 Feb 2022News.Qualys Microsoft & Adobe Patch Tuesday (February 2022) – Microsoft 70 Vulnerabilities with 0 Critical; Adobe 17 Vulnerabilities with 5 CriticalMicrosoft Patch Tuesday – February 2022 Microsoft addresses 70 vulnerabilities in their February 2022 Patch Tuesday release. While none of the Read More
13 Feb 2022News.ThreatQuotient Chris Jacob, ThreatQuotient: organizations must automate their security systems to mitigate escalating cyber threatsEven though protecting against malicious threat actors is equally important for both regular users and businesses, corporations are even more Read More
12 Feb 2022Forcepoint.News The DOJ Recovers Bitcoin Worth $3.6 Billion, SIM Swap Attacks Rise, Antlion Attacks Taiwanese Businesses, Backdoor Trojan Attacks macOS VulnerabilityEarlier this week, the Justice Department seized more than $3.6 billion in bitcoin that was believed to be stolen as part of the 2016 hack of the Read More
11 Feb 2022Micro Focus.News It’s (always) time to changeHistory gives us plenty of reminders of the dangers of not changing with the times. The market quickly forgets those who get left behind. Derek Read More
8 Feb 2022News.Qualys Managing CISA Known Exploited Vulnerabilities with Qualys VMDRCISA recently released a directive recommending urgent and prioritized remediation of actively exploited vulnerabilities. Both government Read More
6 Feb 2022Gartner.News.ThreatQuotient Ingecom alcanza un acuerdo de distribución con ThreatQuotientEl fabricante es el primer proveedor de plataformas de inteligencia contra amenazas (TIP) que ofrece servicios directamente desde España. Read More
5 Feb 2022Forcepoint.News.Webinars The Secret of DLP Migration? It Doesn’t Have to HurtToo often, I talk to customers who had been settling previously for a sub-optimal, legacy DLP solution because they feared the migration process Read More
2 Feb 2022News.PROFITAP Profitap IOTA v2.2.2 Release NotesThe newly released IOTA software version 2.2.2 includes the following new features:Read More
1 Feb 2022Forcepoint.News Why Data Protection Regulations Require a Watching BriefAlexandra: In this discussion around the challenges facing international businesses who want to protect critical data and remain compliant, Read More
1 Feb 20221 Feb 2022FireEye.McAfee.News.Trellix.What's new in ITSec world Two trusted leaders in cybersecurity McAfee Enterprise & FireEye, Inc. have come together as Trellix to create a resilient digital world.Symphony Technology Group Announces the Launch of Extended Detection and Response Provider, Trellix SAN JOSE, Calif., January 19, 2022—(BUSINESS Read More
1 Feb 2022BeyondTrust.News Elasticsearch is Here!Introducing Privilege Management for Unix & Linux (PMUL) and Active Directory Bridge (AD Bridge) v22.1 The release of Privilege Management Read More
1 Feb 2022News.Qualys Simplifying Cloud Asset Identification in a Multi-Cloud EnvironmentEnterprises struggle to get an accurate asset inventory in multi-cloud or hybrid cloud environments. Qualys enhances the metadata for cloud Read More
31 Jan 20221 Feb 2022Educate yourself about Cybersecurity.McAfee.News What Is a CASB?A Cloud access security broker, or CASB, is cloud-hosted software or on-premises software or hardware that act as an intermediary between users Read More
31 Jan 20221 Feb 2022Case study.News Efficiency of GoAnywhere MFTPremier Children’s Hospital Finds Batch File Processing Easier with GoAnywhere MFT Industry: Healthcare A leading children’s hospital and go-to Read More
31 Jan 20221 Feb 2022Netwrix.News.Tech Best Practices Top 5 Azure AD Security Best PracticesAzure Active Directory holds the keys to your Microsoft 365 kingdom. Responsible for vital functions such as authentication and authorization, Read More
31 Jan 20222 Feb 2022BeyondTrust.Good to know.News Cybersecurity Survival Guide 2022 EditionMany of the workplace changes accelerated by the pandemic are expected to endure, and a more durable hybrid work environment is taking root. The Read More
30 Jan 2022News.Niagara Networks Empowering data privacy with the right network visibility solutionIn the digital transformation age, the cybersecurity industry received tremendous spotlight with respect to the pervasive capability of the IT Read More
30 Jan 2022News.ThreatQuotient How Threat Intelligence Can Help Businesses Respond To CyberthreatsExpert Insights speaks to Chris Jacob, Vice President of Threat Intelligence Engineering at ThreatQuotient, to discover how organizations can Read More
29 Jan 2022Forcepoint.News Cryptocurrency News: Building in Resiliency and International Co-OperationTurning to cybersecurity news within cryptocurrencies this month, Crypto.com admitted that login issues that had plagued users turned out to be a Read More
25 Jan 2022Forcepoint.News The Dynamic Dozen: Our Favorite Episodes of To The Point Cybersecurity Podcast in 2021Plenty of people are talking about cyberattacks, but fewer are talking about cyber cartels. For this episode, we sat down with Tom Kellerman, the Read More
25 Jan 2022BeyondTrust.News Australian Security Leaders Assess Impact of Amendments to Security of Critical Infrastructure Bill | BeyondTrustThe global events of 2021 again made it difficult to plan and execute most face-to-face gatherings as a security and technology community. Read More
23 Jan 2022News.Press releases.ThreatQuotient Power the SOC of the Future with the DataLinq Engine – Part 3Power the SOC of the Future with the DataLinq Engine – Part 3 LEON WARD In my first blog in this three-part series, we discussed the Read More
22 Jan 2022Forcepoint.News VPNLab[.]net Service Shutdown, Aftermath of Kronos Attack, Public Sector Ransomware Attacks in 2021, Data-wiping Software Targets Ukraine, APT35 Uses PowerShell Log4j BackdoorLaw enforcement agencies across 10 nations, including the FBI shut down a 15-server VPN operation used by cybercriminals to anonymize ransomware Read More
18 Jan 202219 Jan 2022News.Trellix Symphony Technology Group Announces the Launch of Extended Detection and Response Provider, TrellixSAN JOSE, Calif., January 19, 2022—(BUSINESS WIRE)— Symphony Technology Group (STG) announced today the launch of Trellix, a new business Read More
18 Jan 2022News.Qualys The Chaos Ransomware Can Be RavagingThe Qualys Research Team has observed a new version of Chaos ransomware in development. This blog reviews the malware’s updated functionality as Read More
18 Jan 2022News.Riverbed Hybrid Work Global Survey 2021 | Riverbed | AternityHybrid work is the new norm and critical to organizational success—but the question is, are you ready to support the hybrid workplace? To assess Read More
16 Jan 2022News.Niagara Networks.Webinars Modern DDoS defenses for National Networks – combining network visibility in Design and ImplementationDistributed Denial-of-service (DDoS) attacks continue to accelerate and evolve into highly sophisticated vectors, threatening any digitally Read More
16 Jan 2022News.ThreatQuotient The coming reckoning: Showing ROI from threat intelligenceThreat intelligence has been a part of cyber defense processes in the private sector for nearly a decade now. Many threat intelligence teams Read More
15 Jan 2022Forcepoint.News Protecting the Most Dangerous Door to Data LossEmail is the most popular threat vector for attackers to use for delivering malware to an organization. Email is also a direct line of contact Read More
11 Jan 2022Forcepoint.News Why Cybersecurity Cannot Be Separated from National SecurityIn the episode, Alperovitch brings a particularly important perspective to the table as we think about threats like ransomware or supply chain Read More
11 Jan 2022BeyondTrust.News Essential Cybersecurity Survival Strategies for 2022 & Beyond (New Guide!) | BeyondTrustIn cyberspace, there exists no safe harbor. Every organization with a digital presence is exposed like an island amidst an angry, implacable Read More
11 Jan 2022News.Qualys Emotet Re-emerges with Help from TrickBotEmotet has recently reemerged after being taken down less than a year ago by global law enforcement as coordinated by Europol and Eurojust. The Read More
10 Jan 2022Micro Focus.News Supporting Society’s Biggest Challenges: Our Year in ReviewThe year 2021 has been a significant one. Never before has the need to create a more sustainable, inclusive world been more relevant – as Read More
9 Jan 2022News.ThreatQuotient The Second Building Block for the SOC of the Future: An Open Integration FrameworkThe SOC of the future must be data driven, so it’s essential that systems and tools can work together As we turn the page on another year Read More
8 Jan 2022Forcepoint.News 2021 Malware Report: The Looming Ransomware ThreatWith high-profile malware and ransomware attacks capturing recent headlines, organizations have elevated this problem to a top priority,” said Read More
6 Jan 2022McAfee.News Technical Analysis of CVE-2021-1732The vulnerability, CVE-2021-1732, is a win32k window object type confusion leading to an OOB (out-of-bounds) write which can be used to create Read More
4 Jan 2022BeyondTrust.Gartner.News BeyondTrust Named a 2021 Gartner Peer Insights™ Customers’ ChoiceBeyondTrust is thrilled to share that we have been recognized as a ‘Customers’ Choice’ in the December 2021 Gartner Peer Insights ‘Voice of the Read More
4 Jan 2022News.Qualys Log4Shell – Follow This Multi-Layered Approach for Detection and RemediationSince the Log4Shell vulnerability was first discovered, Qualys has analyzed and responded to the threat in a systematic way approaching it from Read More
3 Jan 2022News.Riverbed Log4J Threat Hunting with NetProfiler and AppResponse | Riverbed|AternityA recently discovered vulnerability in the Java logging utility Log4J (CVE-2021-44228)1 enables remote code execution exploits in a variety of Read More
2 Jan 2022News.PROFITAP Log4j Security Notice Log4j Security Notice & IOTA v2.2.1 Concerning Log4j and Profitap: Potentially affected products Profitap IOTA (any version). Read More
28 Dec 2021News.Qualys How to Discover Log4Shell Vulnerabilities in Running Containers & ImagesIf you run Java applications in containers, then it is critical that you check for Log4Shell vulnerabilities, given the high severity of this Read More
27 Dec 2021Micro Focus.News Every Hero Needs a SidekickIn the rush towards digital transformation, even the heroic CIO needs someone they can turn to, says Derek Britton. Who is in your corner to help Read More
25 Dec 2021Forcepoint.News Cashing in on CryptoIf proof were needed, regulators in both the UK and USA have just published guidance on cryptocurrencies for banks and financial institutions. Read More
23 Dec 2021McAfee.News Threat Intelligence and Protections Update Log4Shell CVE-2021-44228CVE-2021-44228 – Apache Releases Log4j Version 2.15.0 to Address Critical RCE Vulnerability Under Exploitation. Threat Summary Read More
21 Dec 2021Forcepoint.News.Webinars Securing the Perimeter of Higher Education – A Fireside Chat with SUNY PlattsburghHigher education institutions of today must practice a delicate balancing act of delivering a high-quality, uninhibited student experience while Read More
21 Dec 2021BeyondTrust.News CVE-2021-44228 or “Log4Shell” is a remote code execution zero-day vulCVE-2021-44228 or “Log4Shell” is a remote code execution zero-day vulnerability in the Apache Log4j2 library, originally disclosed on Read More
21 Dec 2021News.Qualys Qualys Integrates with Shodan to Help Map the External Attack SurfaceQualys CyberSecurity Asset Management (CSAM) now natively integrates with Shodan to enable cybersecurity teams to identify all assets visible on Read More
19 Dec 2021News.Press releases.ThreatQuotient.Webinars Run out of Netflix options? Check out our Most Popular Webinars for 2021Run out of Netflix options? Check out our Most Popular Webinars for 2021 KASEY ELLO We’re fortunate to have a depth and breadth of Read More
18 Dec 2021Forcepoint.News Forcepoint Security News: Log4Shell Vulnerability, Pfizer Trade Secrets Exfiltration, Classifieds Site Leaked Personal Info via the F12 Key, and Hive Ransomware Enters Big LeagueThe recently discovered Log4Shell vulnerability in the popular open source Log4j logging software lets an attacker gain access to a vulnerable Read More
18 Dec 2021News.Riverbed Zoom, Teams, DNS and New TCP Analysis Extract Application and Network Intelligence | Riverbed|AternityWith the vast bulk of the world’s white-collar workforce working from home during the COVID-19 pandemic, there was an explosion in demand for Read More
17 Dec 2021Micro Focus.News Update on Micro Focus Response to “Log4j” VulnerabilityDecember 15, 2021 Updates: Micro Focus is taking immediate action regarding Common Vulnerabilities and Exposures CVE-2021-44228 and Read More
14 Dec 2021Forcepoint.News Cool Heads and Hot WalletsWhy is Cryptocurrency so hot? Rising inflation is devaluing cash reserves by the day, making crypto an ever more attractive investment Read More
14 Dec 2021BeyondTrust.Gartner.News.Webinars Managing Privileged Access across Multicloud IT Environments | BeyondTrustAdmin, superuser, root – different names for the same concept: an account that has total control over a system. In the Windows world, this Read More
14 Dec 2021News.Qualys Developing a Repeatable and Sustainable Security Exploitable Risk Reporting ProgramIntroduction The key to creating a practical Reporting Philosophy is/are well-written vulnerability management policies, standards, and Read More
13 Dec 2021McAfee.News Log4Shell Vulnerability is the Coal in our Stocking for 2021What is it? The vulnerability exists in the way the Java Naming and Directory Interface (JNDI) feature resolves variables. When a JNDI Read More
12 Dec 2021News.Press releases.ThreatQuotient The Threat Model as a CompassThe Threat Model as a Compass ANTHONY STITT The purpose of the Cyber Threat Intelligence (CTI) team is to understand the cyber threat environment Read More
11 Dec 2021Forcepoint.News.Webinars Product Spotlight—Bitglass Platform DLP December 14Because it’s built with familiar policy models, you won’t need to reinvent your approach and policies as you move to the cloud. Bitglass’ Read More
7 Dec 2021News.Titus Take the best-of-breed track to implementing data classificationDownload our infographic The post Take the best-of-breed track to implementing data classification appeared first on Titus. This post was first Read More
7 Dec 2021Forcepoint.News Dr. Andrew Hammond Talks Cyber Espionage, Spy Museum and MoreIndeed, the desire to know what an adversary is doing is hardly a new one. Instead, technology and the role of the intelligence agent have Read More
7 Dec 2021BeyondTrust.News BeyondTrust Launches Cloud Privilege Broker for Control Over Multicloud Permissions & Entitlements | BeyondTrustIt is my pleasure to announce the release of BeyondTrust Cloud Privilege Broker, a new solution built from the ground up to help our customers Read More
5 Dec 2021News.Press releases.ThreatQuotient.Webinars What Does Sun Tzu Have to Do with XDR? More Than You Might Think!What Does Sun Tzu Have to Do with XDR? More Than You Might Think! ANTHONY PERRIDGE Military general and philosopher Sun Tzu once led the largest Read More
4 Dec 2021Forcepoint.News Forcepoint Security News: GoDaddy Breach Widens, Panasonic Confirms Cyberattack, California Pizza Kitchen Serves Up Employee SSNs, and Political CyberattacksGoDaddy Breach Widens, Includes Reseller Subsidiaries Panasonic Confirms Cyberattack and Data Breach California Pizza Kitchen Serves Up Employee Read More
2 Dec 2021McAfee.News The Bug Report – November EditionCVE-2021-20322: Of all the words of mice and men, the saddest are, “it was DNS again.” Your Cybersecurity Comic Relief To Read More
30 Nov 2021Forcepoint.News Product Spotlights: Network Security Session Coming December 7All of these elements have opened a Pandora’s box. A Robert Half survey found that 49% of employees prefer a hybrid work arrangement that Read More
30 Nov 2021News.Qualys It’s a Wrap! QSC 2021 Las Vegas Laid Out Problems, Solutions and InnovationAlthough organizations have made moves toward it for years, digital transformation, in a way, has only just begun. The pandemic may have Read More
29 Nov 2021McAfee.News.Webinars McAfee Enterprise Defender Blog | CISA Alert: MS Exchange & Fortinet VulnerabilitiesThreat Summary On November 17, 2021, The US Cybersecurity & Infrastructure Security Agency (CISA) pushed an Alert entitled “Iranian Read More
28 Nov 2021News.Press releases.ThreatQuotient Integration of the ThreatQ platform into McAfee Enterprise infrastructureIntegration of the ThreatQ platform into McAfee Enterprise infrastructure EUTIMIO FERNANDEZ Proper management of threat data is critical in Read More
27 Nov 2021News.ThreatMark ThreatMark Recognized Top 5 in Deloitte’s 2021 Technology Fast 50 CEThreatMark, provider of the most advanced online fraud prevention solution in the market, has been recognized in the Top 5 Deloitte’s 2021 Read More
25 Nov 2021Gartner.McAfee.News Global Technology Provider Looks to MVISION Unified Cloud EdgeTo better serve its customers and secure its own environments, one global technology provider decided to expand its existing on-premises data Read More
23 Nov 2021BeyondTrust.News.Webinars Multicloud Security & Permissions Management: Practical Tips | BeyondTrustHere is a question to consider: How many cloud solutions does each organization need? If your organization wishes to remain competitive – the Read More
23 Nov 2021News.Qualys Euronet Worldwide: Speedy, Global Response to Threats Reduces RiskAfter years of using manual processes and systems to manage its IT inventory and track vulnerabilities, racking up costs, and increasing the Read More
22 Nov 2021McAfee.News Ransomware Threats Affecting the Public SectorIn June 2021 the G7 economies urged countries that may harbor criminal ransomware groups to take accountability for tracking them down and Read More
21 Nov 2021News.Niagara Networks Resolving the Packet Duplication ChallengesSeamless monitoring of network traffic is critically important for enterprise network and security administrators: it lies at the very foundation Read More
21 Nov 2021Gartner.News.ThreatQuotient Acronyms Aside, the SOC of the Future Needs These 3 CapabilitiesEvery discipline has its acronyms, but I’d venture to say cybersecurity has more than its share. We use them to describe threat actors and Read More
20 Nov 2021Forcepoint.News The Rise of Tractor Hackers and Smart City AttackersBy trying to remove the overhead of humans through automation, food producers and farmers have incidentally built their businesses on an Read More
18 Nov 2021Gartner.McAfee.News Qualities of a Highly Available CloudMVISION UCE, our data-centric, cloud-native Security Service Edge (SSE) security platform, derives its capabilities from McAfee Read More
16 Nov 2021Forcepoint.News SolarWinds CEO Talks Sunburst Attack, SecurityDon’t miss this insightful and inspiring discussion, part of Forcepoint’s To The Point podcast series named to FedTech’s Top 30 Federal IT Read More
16 Nov 2021BeyondTrust.News Proactive PAM Defenses against LightBasin (UNC1945) & other Advanced Attackers | BeyondTrustOn October 19, 2021, CrowdStrike released a detailed analysis of a cyberattack waged on telecommunications companies by a group dubbed LightBasin Read More
16 Nov 2021News.Qualys Microsoft & Adobe Patch Tuesday (November 2021) – Microsoft 55 Vulnerabilities with 6 Critical, 6 Zero-Days. Adobe 4 VulnerabilitiesMicrosoft Patch Tuesday – November 2021 Microsoft patched 55 vulnerabilities in their November 2021 Patch Tuesday release, of which six are rated Read More
15 Nov 2021McAfee.News Veterans Day & Remembrance Day 2021When were you drafted or when did you enlist/join? What branch of the military did you serve and in what rank? Shannon Clancy joined October 5, Read More
15 Nov 2021Micro Focus.News If We Really Want to Drive Change, We Have to Work TogetherThe final INSPIRE 20 podcast looks back at a number of the ways that individuals are promoting inclusion and diversity in their own lives and how Read More
14 Nov 2021News.Press releases.ThreatQuotient ThreatQuotient dévoile ThreatQ v5 : pour soutenir le SOC du futur avec des capacités clés de gestion des donnéesL’approche axée sur les données, l’architecture d’open intégration et l’automatisation Read More
13 Nov 2021Forcepoint.News Security News: U.S. Offers DarkSide Bounty, Nobelium Campaigns Continue, and International Ransomware AttacksU.S. Cracks Down on Ransomware, Offers $10 Million Bounty for DarkSide Info Nobelium, The Hackers Behind SolarWinds Attack, Targets IT Supply Read More
13 Nov 2021News.Opentext An open letter to anyone switching their supply chain integration servicesDear Reader, If you’re here then you are at least marginally associated with some aspect of your company’s Read More
11 Nov 202128 Feb 2022Group-IB.News.Webinars See Your Company Through The Eyes Of The HackerFew corporate breaches actually involve zero-day vulnerabilities or advanced exploits. Instead, those breaches result from ordinary Read More
11 Nov 2021McAfee.News Legendary Entertainment Relies on MVISION CNAPP Across Its Multicloud EnvironmentLegendary Entertainment is a global media company with multiple divisions including film, television, digital studios, and comics. Under the Read More
9 Nov 2021Forcepoint.News Security News: REvil Group Taken Offline by Feds, Attacker Activities and a VPN Company Exposes DataREvil Ransomware Gang Taken Offline (Again) by FBI DarkSide Moves to Cash Out $7m in Bitcoin Acer Confirms Second Cyberattack Within a Week of Read More
9 Nov 2021BeyondTrust.News SSD Advisory – macOS Finder RCE & How Privilege Management for Mac Can Mitigate It | BeyondTrustThe SSD Advisory in macOS Finder RCE, discovered last month by independent security researcher, Park Minchan, underscores the need for having Read More
9 Nov 2021News.Qualys CSPM Evolution – Start Secure, Stay SecureFor the last several years, the Verizon DBIR report has identified misconfigurations, errors that are unintended actions by an internal party, as Read More
7 Nov 2021News.Press releases.ThreatQuotient Cybersecurity Breakthrough Awards Names ThreatQuotient Security Automation Solution of the YearCybersecurity Breakthrough Awards Names ThreatQuotient Security Automation Solution of the Year MARC SOLOMON With thousands of tools and Read More
6 Nov 2021Forcepoint.News Beware the NetSec PretendersAt Forcepoint, that simply isn’t how we do business. We do security. But, if we’ve made such big strides forward, then how is it that cyber Read More
6 Nov 2021News.Opentext A staged approach to achieving clinical data intelligenceIn 1925, inventor Hugo Gernsbacher suggested a remote control device for physicians and called it ‘Teledactyl,’ effectively Read More
4 Nov 2021McAfee.News The Bug Report – October EditionApache server version 2.4.50 (CVE-2021-42013) Your Cyber Security Comic Relief Apache: CVE-2021-41773 and CVE-2021-42013 What is it? 2 CVES / 1 Read More
3 Nov 2021cPacket Networks.News cPacket Networks Extends Cloud Visibility with Microsoft Azure Gateway Load BalancerThe post cPacket Networks Extends Cloud Visibility with Microsoft Azure Gateway Load Balancer appeared first on cPacket Networks.Read More
3 Nov 2021News.Riverbed Hybrid Work Global Survey 2021 | Riverbed | AternityWe get it, hybrid work is important and here to stay. But shifting to a high-performing hybrid work model is challenging and elusive for most Read More
3 Nov 2021News.Riverbed Hybrid Work Global Survey 2021 | Riverbed | AternityHybrid work is the new norm and critical to organizational success—but the question is, are you ready to support the hybrid workplace? To assess Read More
3 Nov 2021Cofense.News Cofense General Counsel and Chief Privacy Officer Shane McGee to Speak At 2021 RSA ConferenceLeesburg, Va. – May 6, 2021 – Cofense, the leading provider of phishing detection and response (PDR) solutions, today announced that the Read More
2 Nov 2021News.Titus Why You Need A Specialist Provider – Getting The Product Support You Need Home » Titus Blog » Why You Need A Specialist Provider – Getting The Product Support You Need Georgina Stockley · Monday, November 1st, Read More
2 Nov 2021BeyondTrust.News 2021 Survey of Evolving Cyber Threats in the Public Sector: Key Takeaways | BeyondTrustPublic sector IT teams are leaning into digital transformation and increasing their reliance on automation (such as robotic processing Read More
2 Nov 2021News.PROFITAP Profitap Supervisor Release NotesWith network growth ever on the rise, it can become more and more difficult to implement, manage, and maintain monitoring equipment such as Read More
2 Nov 2021News.Qualys Apache HTTP Server Path Traversal & Remote Code Execution (CVE-2021-41773 & CVE-2021-42013)On October 4, 2021, Apache HTTP Server Project released Security advisory on a Path traversal and File disclosure vulnerability in Apache HTTP Read More
1 Nov 2021McAfee.News McAfee Enterprise & FireEye 2022 Threat PredictionsRansomware, nation states, social media and the shifting reliance on a remote workforce made headlines in 2021. Bad actors will learn from this Read More
1 Nov 2021Micro Focus.News Micro Focus Post-Sales: SupportedI am Dr. James D. Borderick, and I look after the Competitive Benchmark research for Micro Focus, which I have been doing for over five years. I Read More
31 Oct 2021News.ThreatQuotient 3 Questions for MDRs Helping to Get Your Enterprise to XDRAn XDR implementation can quickly turn into a very large consulting project requiring significant time and budget As cybersecurity professionals Read More
30 Oct 2021Forcepoint.News Cyberattacks: Now Part of the Military ArsenalWhile the U.S. has used cyber strategy for warfare in the past, it can be used against the U.S. too. Stuxnet was an outlier at the time. But we Read More
30 Oct 2021News.Opentext Is empathy drowning in a sea of data?The idea of the family doctor has passed into history. In fact, fewer and fewer Americans have a primary care provider. Yet empathy is, and must Read More
29 Oct 2021Micro Focus.News COP26: Our Actions Today Impact Tomorrow; Take Part in “Count Us In” ProjectThis year’s COP26, the UN Climate Change Conference, is a key event in 2021. As world leaders come together to commit to urgent global climate Read More
28 Oct 2021McAfee.News.Webinars Why an Ounce of Cybersecurity Prevention is Worth a Pound of DetectionAt that point, you’re looking to find out what your adversaries have seen or stolen, you want to plug the holes that enabled the hack and Read More
27 Oct 2021News.ThreatMark ThreatMark attracts additional funding; appoints Daniel Rawlings as new CEO & President to lead the next phase of expansion & growthPrague, Brno, 21st October 2021 – ThreatMark, provider of the most advanced online fraud prevention solution in the market, has completed a new Read More
27 Oct 2021Cofense.News Cybersecurity First – It’s Everyone’s Job!Cybersecurity goes beyond October By Tonia Dudley Start the cybersecurity journey early with your employees or teammates. Work with your human Read More
26 Oct 2021Forcepoint.News Forcepoint Closes Acquisition of BitglassThat’s why I’m excited to announce today Forcepoint completed the acquisition of Security Service Edge (SSE) leader Bitglass. Bitglass helps Read More
26 Oct 2021BeyondTrust.Gartner.News Top 6 Overlooked Identity Security Problems | BeyondTrustTop 6 Overlooked Identity Security Problems | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time in a row. Read More
26 Oct 2021News.Qualys Vulnerability On-Demand Search Reporting & Easy Download optionsVulnerability reporting is different from any other aspect of a Vulnerability Management Program. The methodologies of Discover, Assess, Report Read More
25 Oct 2021Gartner.McAfee.News Realize Your SASE Vision with Security Service Edge and McAfee EnterpriseMany people are excited about Gartner’s Secure Access Service Edge (SASE) framework and the cloud-native convergence of networks and Read More
25 Oct 2021Micro Focus.News How does social responsibility relate to the Net Promoter® Score?Social responsibility is no longer a ‘niche’, instead it touches every industry around the world, including the software industry. It is Read More
24 Oct 2021News.Press releases.ThreatQuotient Interested in a Career in Cybersecurity? These Tips Can Help Guide Your JourneyInterested in a Career in Cybersecurity? These Tips Can Help Guide Your Journey KASEY ELLO With the current global cybersecurity talent shortage Read More
23 Oct 2021Forcepoint.News Product Spotlights: Network Security Session Coming October 26All of these elements have opened a Pandora’s box. A Robert Half survey found that 49% of employees prefer a hybrid work arrangement that Read More
23 Oct 2021News.Opentext Are your citizens paying a time tax?When was the last time you tried to get something done at your local, state or federal government agency? Did you look forward to it? Was it Read More
21 Oct 2021McAfee.News Is There Really Such a Thing as a Low-Paid Ransomware Operator?Lurking in the shadows of every large-scale attack by organized gangs of cybercriminals, however, there can be found a multitude of smaller Read More
20 Oct 2021Cofense.News Cybersecurity Career AwarenessWith the large gap in the cybersecurity workforce, it’s not surprising that the Cybersecurity and Infrastructure Security Agency (CISA) advocated Read More
19 Oct 2021BeyondTrust.Gartner.News Australian & New Zealand Government Reports Highlight the Value of PAM to Disrupt Cyber Attacks | BeyondTrustAustralian & New Zealand Government Reports Highlight the Value of PAM to Disrupt Cyber Attacks | BeyondTrust 2021 Gartner Magic Quadrant Read More
19 Oct 2021News.Qualys Apple fixes zero-day in iOS and iPadOS 15.0.2 emergency release: Detect and Prioritize Vulnerabilities using VMDR for Mobile DevicesApple recently released iOS and iPadOS 15.0.2 as an emergency security update that addresses 1 critical zero-day vulnerabilities, which is Read More
18 Oct 2021Gartner.McAfee.News China Personal Information Protection Law (PIPL): A New Take on GDPR?GDPR is a framework which requires businesses to implement processes to enable them to understand where data is held, how it is used, how long it Read More
18 Oct 2021News.Riverbed Visibility, Actionable Insights and Performance for the Modern, Hybrid Enterprise | RiverbedThis is an exciting week, as we host the Riverbed Global User Conference with thousands from both the Riverbed and Aternity user communities Read More
18 Oct 2021Micro Focus.News Software: Successfully Educated.I am Dr. James D. Borderick, and I look after the Competitive Benchmark research for Micro Focus, which I have been doing for over five years. I Read More
17 Oct 2021News.Press releases.ThreatQuotient.Webinars Curate and Share Threat Intelligence to Accelerate Security OperationsCurate and Share Threat Intelligence to Accelerate Security Operations MIKE SOLOMON AND ROSS HAMMER Over the last several months we’ve seen Read More
17 Oct 2021Indeed Identity.News Indeed PAM 2.6: modern response to potential threatsThe Indeed PAM software suite has been updated to Version 2.6. The release includes a lot of improvements and a number of new features that make Read More
16 Oct 2021Forcepoint.News To Cloud or Not to Cloud? The Case for a Hybrid InfrastructureBut, it’s not all good news. In the process of breaking barriers, security best practices were sometimes sacrificed. As with anything in the Read More
16 Oct 2021News.Opentext #BeCyberSmart: Detect forensically and respond rapidlyOctober is Cyber Awareness Month. To mark this I’m writing about a subject that is close to my heart, a subject I believe is our best Read More
14 Oct 2021McAfee.News 2021 Hispanic Heritage Month Pt. 5: A Celebration of Hispanic Heritage and HopeWhat do you enjoy most about your heritage and what is one of your favorite memories growing up? I love the food and music. To this day I Read More
13 Oct 2021Cofense.News Fight the Phish! Don’t Hesitate to report phishing!With phishing threats still the largest threat leading to a data breach, it’s not surprising that Department of Homeland Security (DHS) / Read More
12 Oct 2021BeyondTrust.Gartner.News ACSC Essential Eight | BeyondTrustACSC Essential Eight | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time in a row. Learn why! Dismiss Read More
12 Oct 2021News.Qualys From Technical Features to Customer Security MetricsQualys solutions are packed with great functionality to deliver operational efficiency to all our customers, but the value does not end with bits Read More
11 Oct 2021Ivanti.News 3Ps of Security: Protect, Prioritize and PatchLike a football or soccer team, security also has two lineups that must be continuously managed. One lineup involves protecting the digital Read More
11 Oct 2021McAfee.News Shaping the Future of CybersecurityI’m incredibly proud to be writing this as the newly appointed CEO of this combined business. Keeping nations and large enterprises safe is Read More
10 Oct 2021News.ThreatQuotient How Integration is Evolving: The X Factor in XDRXDR must be approached as an open architecture where integration is the linchpin Over the past couple of months, I’ve talked about how Read More
9 Oct 2021Forcepoint.Gartner.News Data Security Session Coming October 12As companies begin to open offices post-pandemic, Gartner sites 82% of organizations intend to permit remote working some of the time—even after Read More
9 Oct 2021News.Opentext How to increase billable hours and revenue for your law firmHow much time does the average person spend on their phone? Not surprisingly, a lot. People are spending an average screen time of 5.4 hours on Read More
7 Oct 2021McAfee.News Executive Spotlight: Q&A with Vice President, Global Commercial, Britt NorwoodQ: What’s the first career you dreamed of having as a kid? My first career was as a paper boy from 5th through 8th grade, but I always Read More
6 Oct 2021Cofense.News Be Cyber Smart: Four Steps to Protecting Your Business or HomeAs we kick of Cybersecurity Awareness Month, let’s start with a bit of background before digging into this week’s #BeCyberSmart theme. The Read More
5 Oct 2021Forcepoint.Gartner.News Value of SASE: Mitigate Threats to Data SecurityEnsuring that you can maintain control over such data, whether it’s a spreadsheet that has been downloaded to a laptop or a document stored in Read More
5 Oct 2021BeyondTrust.Gartner.News TrickBot Attack Chain: Deconstructed & Mitigated | BeyondTrustTrickBot Attack Chain: Deconstructed & Mitigated | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time Read More
5 Oct 2021News.Qualys QID Spotlight: Discover Azul Java VulnerabilitiesThe Qualys vulnerability signatures team has released a new series of signatures (detections) for Azul Java, allowing security teams to identify Read More
3 Oct 2021News.ThreatQuotient ThreatQuotient Publishes Research Report: State of Cyber Security Automation Adoption in 2021Report highlights trends and challenges of automating IT security systems and how CISOs and senior security professionals are planning to Read More
3 Oct 2021News.Riverbed Improved Alerting | NetIM Infrastructure Monitoring | RiverbedIf I had to pick one theme for the Riverbed NetIM infrastructure monitoring release (version 2.4), it would have to be new and improved alerting. Read More
2 Oct 2021Forcepoint.News Forcepoint Product Spotlights: Sessions to help secure your perimeter, secure your dataRegister for a Forcepoint Product Spotlight At Forcepoint, our goal is to arm our customers with technology that enables a hybrid workforce to be Read More
2 Oct 2021News.PROFITAP Profitap Showcases Network Monitoring Solutions at GITEX’21 in DubaiThe GITEX Technology Week (October 17-21, 2021, in Dubai, United Arab Emirates) is the biggest tech show in the Middle East, North Africa & Read More
2 Oct 2021News.Opentext National Day for Truth & ReconciliationReconciliation is not a noun. It is not an event. It’s a verb. – Roberta Jamieson Today we honor the lost children and Survivors of Read More
1 Oct 2021Indeed Identity.News Building Mindset for Privileged Account ManagementFor most companies PAM is something that is associated with creating borders or limitations. Often organizations are forced to implement PAM due Read More
1 Oct 2021Micro Focus.News Volunteering to Make Positive Impacts: My Volunteering StoryAs dozens of Micro Focus employees take time out to volunteer at their local foodbanks to support our charity partner Feeding America’s Hunger Read More
30 Sep 2021Gartner.McAfee.News The Art of Ruthless Prioritization and Why it Matters for SecOpsOne of the important goals of SecOps is a faster and more effective collaboration among all personnel involved with security. The team seeks to Read More
29 Sep 2021Cofense.News Three is the Magic NumberWhen it comes to prioritizing or recalling information, three is the magic number. Many of us know this thanks to Schoolhouse Rock with the Read More
28 Sep 2021BeyondTrust.Gartner.News Privileged Password Management in a Zero Trust Environment | BeyondTrustPrivileged Password Management in a Zero Trust Environment | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third Read More
28 Sep 2021News.Qualys Prioritize Remediation with a Perceived-Risk Approach to Strengthen CyberSecurity EffectivenessMinimizing Time To Remediate (TTR) is becoming one of the key metrics of security program effectiveness. This holistic measure represents many Read More
27 Sep 2021McAfee.News Detecting Credential Stealing Attacks Through Active In-Network DefensePost initial compromise, to be able to execute meaningful attacks, attackers would need to steal credentials to move laterally inside the Read More
26 Sep 2021News.Press releases.ThreatQuotient ThreatQuotient Continues Tradition of Celebrating World Rhino Day in 2021Rhino conservation efforts remain an important mission for the Reston, Va. based cybersecurity company Reston, Va. – Sept. 22, 2021 – Read More
25 Sep 2021Forcepoint.News How Two Fortune 150 Companies Save Millions With ForcepointApart from the obvious advantages of protecting the brand’s reputation and avoiding financial penalties by defending against security threats, Read More
25 Sep 2021News.Opentext Enabling highly personalized content at scale with customer dataFor content marketers, finding out that the campaign you worked so hard on didn’t hit the spot is incredibly frustrating. It’s even Read More
24 Sep 2021Micro Focus.News “Staying Current” is Not Just a Fashion StatementKeeping up with the latest fashion trends can be an uncomfortable and costly exercise. Having mistakenly perceived the wisdom of flared trousers, Read More
23 Sep 2021McAfee.News McAfee Enterprise Defender Blog | OMIGOD Vulnerability Opening the Door to Mirai BotnetThis month Microsoft released patches for 86 vulnerabilities. While many of these vulnerabilities are important and should be patched as soon as Read More
22 Sep 2021Cofense.News Phishing as a Ransomware PrecursorFor what seems like years now, ransomware has captured headlines due to its sensationally disruptive and costly nature. And over these years, Read More
21 Sep 2021BeyondTrust.Gartner.News Remote Access Control Strategies for the Work-from-Anywhere (WFA) Era | BeyondTrustRemote Access Control Strategies for the Work-from-Anywhere (WFA) Era | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader Read More
21 Sep 2021News.Qualys Improving Cybersecurity Practices by Managing the Asset LifecycleSecuring enterprise environments continues to increase in importance. Attacks on infrastructure continue to increase and organizations need to Read More
20 Sep 2021McAfee.News The Bug Report | September 2021: CVE-2021-40444There’s a lot of information out there on critical vulnerabilities; this short bug report contains an overview of what we believe to be the Read More
19 Sep 2021Gartner.News.ThreatQuotient How Threat Response is EvolvingAs adversaries changed their view of an attack to include vectors across an organization, defenders have had to evolve their approach as well. Read More
18 Sep 2021Forcepoint.News Value of SASE: Secure Data in the CloudTo mitigate this risk, many businesses and government agencies began shifting to cloud-based security to replace the on-premises solutions. In Read More
18 Sep 2021News.Opentext Innovating with your customersFrom healthcare to supply chains to cyber security, the global pandemic has fundamentally changed how we live and work. Although digital Read More
16 Sep 2021McAfee.News Executive Spotlight: Q&A with SVP of Global Channels, Kathleen CurryQ: Who has been the most influential person in your life? My father instilled in me, from as far back as I can remember, that I can do whatever I Read More
14 Sep 2021Forcepoint.News Network Security: The Invisible DefenderThe shift to remote work and the increasing complexity of the technology landscape – with most organizations now running hybrid infrastructures Read More
14 Sep 2021BeyondTrust.Gartner.News How Well do Windows 10 Security Features Protect against Ransomware? | BeyondTrustHow Well do Windows 10 Security Features Protect against Ransomware? | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for Read More
13 Sep 2021McAfee.News How to Talk to Your Grandparents About CybersecurityWith Grandparent’s Day right around the corner, here’s a guide on how you can help keep your grandparents safe from the Read More
12 Sep 2021News.Press releases.ThreatQuotient Leveraging MISP and TheHive When You Create Your CTI PracticeLeveraging MISP and TheHive When You Create Your CTI Practice CYRILLE BADEAU Many CISOs I speak with across Europe tell me their cybersecurity Read More
12 Sep 2021News.Versasec Our newest hires expand our R&D and Tech Support groupsDate: 2021-09-10Author: Yvonne Moebius, Human Resources Previous << vSECCMS61 Changing Credential Template on Already Issued Credentials Read More
11 Sep 2021Forcepoint.News The Digital Journey for Our Customers and Partners Just Got BetterHere’s what you told us: I’m excited to share enhancements made to our Forcepoint Customer Hub that directly resulted from our community’s input. Read More
11 Sep 2021Ivanti.News Fighting Ransomware: Using Ivanti’s Platform to Build a Resilient Zero Trust Security Defense – Part 2Within the initial blog in this series, we discussed ransomware attacks and their remediation on Android mobile devices. Part 2 addresses Read More
11 Sep 2021News.Opentext Three MDR strategies for government CISOs to quickly detect and respond to threatsThe US President’s Cybersecurity Executive Order, released in May 2021, outlines “the persistent and increasingly sophisticated Read More
9 Sep 2021McAfee.News Executive Spotlight: Q&A with Chief Public Policy Officer, Tom GannQ: What is one event in your life that made you who you are today? Teaching tennis. I know that teaching tennis is not an event, it’s a Read More
7 Sep 2021BeyondTrust.Gartner.News BeyondTrust Celebrates “Summer of Pride”, Culminating with BeyondDiversity 2021 Summit | BeyondTrustBeyondTrust Celebrates “Summer of Pride”, Culminating with BeyondDiversity 2021 Summit | BeyondTrust 2021 Gartner Magic Quadrant names Read More
6 Sep 2021McAfee.News Executive Spotlight: Q&A with EMEA Senior Vice President, Adam PhilpottQ: Do you have a role model? If so, who is it? Well, there are work and there are more personal role models. At work, I have several past and Read More
5 Sep 2021News.Press releases.ThreatQuotient Learn Why Frost & Sullivan Names ThreatQuotient the XDR Competitive Strategy LeaderLearn Why Frost & Sullivan Names ThreatQuotient the XDR Competitive Strategy Leader MARC SOLOMON Extended Detection and Response (XDR) is the Read More
5 Sep 2021News.Versasec Adolfsson Named Global Product Manager for vSEC:CMSDate: 2021-09-02Author: Yvonne Moebius, Human Resources Previous << PKI Cybersecurity on rise in ASEAN During his nearly five years with Read More
4 Sep 2021News.Opentext AWS for Health and OpenText for Healthcare – Better togetherEarlier this month Amazon Web Services introduced AWS for Health, an offering of curated AWS services and AWS Partner Network solutions used by Read More
3 Sep 2021Micro Focus.News Ensure Customers Receive Return on their Software Investment by being Socially ResponsibleIn our recent work, we have demonstrated the importance of social responsibility and environmentalism for business and have shown how brands are Read More
2 Sep 2021News.PROFITAP Network blind spots: TAPs vs SPAN portsNetwork blind spots could be compared to a slow gas leak. They are hidden areas of the network that negatively impact the network’s Read More
2 Sep 2021Gartner.McAfee.News.Webinars SASE, Cloud Threats and MITREAs a quick refresher, the MITRE Att&CK Matrix represents the relationship between attacker Tactics and Techniques: As you know, McAfee Read More
1 Sep 2021Cofense.News Mobile Messaging Service Abused for PhishingUsing Cofense Vision, analysts at the Cofense Phishing Defense Center (PDC) were able to drill down into the targeting patterns of one phishing Read More
31 Aug 2021Forcepoint.Gartner.News.Webinars Value of SASE: Separating Product from PhilosophySASE isn’t a single product; it’s an architecture or philosophy, according to Gartner analyst Nat Smith. Many vendors now offer bundled solutions Read More
31 Aug 2021BeyondTrust.Gartner.News Good User Experience Leads to Good Security | BeyondTrustGood User Experience Leads to Good Security | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time in a row. Read More
29 Aug 2021Gartner.News.ThreatQuotient How Threat Detection is EvolvingAs adversaries have shifted the focus of attacks to achieve their goals, defenders must evolve their approach to threat detection The threat Read More
29 Aug 2021News.Versasec User Self-Service with vSEC:CMS is Easier than EverDate: 2021-08-24Author: Joerg Dettmann, CTO Previous << Cybercrime is global and so is MFA With every new version of our flagship identity Read More
28 Aug 2021News.Opentext What’s new in OpenText Gupta SQLBase 12.3OpenText™ Gupta SQLBase 12.3 increases access security, provides the tools to comply with data protection regulations like GDPR. The query Read More
26 Aug 2021McAfee.News McAfee Enterprise ATR Uncovers Vulnerabilities in Globally Used B. Braun Infusion PumpCVE-2021-33886 – Use of Externally-Controlled Format String (CVSS 7.7) CVE-2021-33885 – Insufficient Verification of Data Read More
24 Aug 2021News.Titus Why India has Introduced the New Personal Data Protection BillHome » Titus Blog » Why India has Introduced the New Personal Data Protection Bill Maheswaran Shanmugasundaram · Friday, August 20th, Read More
24 Aug 2021BeyondTrust.Gartner.News.Webinars DevOps Security Lessons | BeyondTrustDevOps Security Lessons | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time in a row. Learn why! Dismiss Read More
22 Aug 2021News.Press releases.ThreatQuotient Defence Engineering and Threat Intel – No Stone Left UnturnedDefence Engineering and Threat Intel – No Stone Left Unturned ANTHONY STITT Every breach starts as a compromise that goes unnoticed and Read More
22 Aug 2021News.Versasec Multi-factor authentication is the easiest way to prevent breachesDate: 2021-08-17Author: Chin Jien Lau, Technical Consultant Previous << Hardware Based PKI Webinar The biggest headline-grabbing Read More
21 Aug 2021Forcepoint.News.Webinars SASE’s Role in Retail and HospitalityThat’s where Secure Access Service Edge (SASE) architecture comes in. How can highly distributed organizations, especially ones in which 24/7 Read More
21 Aug 2021News.Opentext.Press releases Learn all about developer services in 15 minutesDevelopers can find it hard to gain insightful and practical knowledge about developer services. Reading lengthy, business-oriented documentation Read More
20 Aug 2021Micro Focus.News Micro Focus Supports Canada’s First Sustainable IT PledgeThe importance of us all taking action to protect the environment has never been greater, which is why Micro Focus is proud to sign the CIO Read More
19 Aug 2021cPacket Networks.News August 2021 NewsletterThe post August 2021 Newsletter appeared first on cPacket Networks.Read More
18 Aug 2021News.Riverbed Supply Chain Attacks | Identify Indicators of compromise | RiverbedConsider a soft drinks manufacturer. If a competitor wanted to damage its market shares, rather than targeting the bottling plant, it would be Read More
17 Aug 2021BeyondTrust.Gartner.News What is System for Cross-domain Identity Management (SCIM) & What are the Benefits? | BeyondTrustWhat is System for Cross-domain Identity Management (SCIM) & What are the Benefits? | BeyondTrust 2021 Gartner Magic Quadrant names Read More
17 Aug 2021News.Qualys Google Android August 2021 Security Patch Vulnerabilities: Discover and Take Remote Response Action Using VMDR for Mobile DevicesThe recently released Android Security Bulletin for August 2021 addresses 36 vulnerabilities, out of which 5 are rated as critical Read More
15 Aug 2021Gartner.News.Press releases.ThreatQuotient Are You Prepared to Better Protect Against SANS’ Top Attacks and Threats?Are You Prepared to Better Protect Against SANS’ Top Attacks and Threats? ANDY GEPERT The SANS 2021 Top New Attacks and Threat Report is Read More
15 Aug 2021News.Versasec Hardware-based PKI is on the rise in ASEAN: Learn whyCompany Blog Our blog addresses the latest security trends and stories. The posts discuss how identity and access management are playing a larger Read More
14 Aug 2021Forcepoint.News “Tiny Crimes” – the WFH behaviors that invite cyber risk (Australian Survey)Here’s a condensed version of the conversation: Dr Margaret Cunningham, Principal Research Scientist at Forcepoint, and Nick Savvides, Read More
14 Aug 2021News.Opentext Get business content management up and running fast with no IT supportThorsten Fischer leads the Product Management team responsible for the OpenText next-generation SaaS content services Read More
12 Aug 2021McAfee.News Data Centric Zero Trust for Federal Government CybersecurityWhereas the DoD architecture establishes control planes that each have their own decision point, with data given its own decision point, NIST Read More
11 Aug 2021Ivanti.News August Patch Tuesday 2021August Patch Tuesday is much lighter than the past few months. A total of 44 vulnerabilities were resolved by Microsoft, seven of which are rated Read More
10 Aug 2021Forcepoint.News Bringing Government-Strength Data Protection to a Commercial Operational EnvironmentYou can read more about cross-domain solutions and Forcepoint Data Guard in part one of our blog series. However, in today’s integrated digital Read More
10 Aug 2021BeyondTrust.News KuppingerCole Executive Review of Endpoint Privilege Management & the BeyondTrust Solution | BeyondTrustRisks of Digital Transformation The coronavirus pandemic sparked a renewed push for digital transformation, so organizations could adapt, become Read More
10 Aug 2021News.Qualys Tenacity – An Adversary Emulation Tool for PersistencePersistence is one of the more sought-after techniques of an attacker or adversary. Persistence is achieved through a set of tactics or Read More
9 Aug 2021McAfee.News White House Executive Order – Improving Detection of Cybersecurity VulnerabilitiesBetween the initial publication of the Executive Order (EO) for Improving the Nation’s Cybersecurity on May 12 and late July, a flurry of Read More
9 Aug 2021Micro Focus.News Why is Software Education so Important?Education. This is not normally a touchpoint along the customer journey that most people think of when describing the main interaction points Read More
8 Aug 2021News.ThreatQuotient Security is a Big Data Problem, and It’s Getting BiggerSolving security’s big data problem is about prioritized data flow, continuously processing data for analysis and translating and exporting Read More
8 Aug 2021News.Versasec PKI & MFA: What you need to knowDate: 2021-08-02Author: Carolina Martinez, GM Americas Previous << MFA Welcome to the second installment in our Summer Series of video Read More
7 Aug 2021Forcepoint.News New Approaches for ‘Air Gapped’ IT and OT Environments for Critical InfrastructureIn this new world of interconnected systems, critical infrastructure organizations benefit from a multitude of Internet of Things devices with Read More
7 Aug 2021News.Opentext OpenText’s 2021 Corporate Citizenship ReportThese past 18 months have made it clear that companies have an opportunity to create positive change, not just for employees and customers, but Read More
5 Aug 2021McAfee.News New Company, Same Commitment: Channel FirstAs we start this chapter as a pure-play enterprise security company, my focus is on adding value for our partners at all levels, ensuring our Read More
3 Aug 2021News.Titus Enterprise Data Classification: Why you need best-of-breed data classificationHome » Titus Blog » Enterprise Data Classification: Why you need best-of-breed data classification Georgina Stockley · Wednesday, July Read More
3 Aug 2021Forcepoint.News Transforming the Science of Security with Human FactorsMy colleague Dr. Calvin Nobles, department chair and associate professor of information and management at the Illinois Tech College of Computing, Read More
3 Aug 2021BeyondTrust.Gartner.News The Seven Perils of Privilege: How Exactly Can You Avoid Them? | BeyondTrust The Seven Perils of Privilege: How Exactly Can You Avoid Them? | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the Read More
3 Aug 2021News.Qualys Qualys Research Nominated for Pwnie Awards 2021The Qualys Research team has been nominated for five Pwnie Awards this year in three different categories. In addition to nominations for Best Read More
2 Aug 2021News.PROFITAP Introducing XX-12800G Network Packet BrokerProfitap recently announced the release of XX-12800G, the new high-density Network Packet Broker, bringing the power and flexibility of network Read More
2 Aug 2021McAfee.News Introducing MVISION Cloud Firewall – Delivering Protection Across All Ports and ProtocolsWherever networks went, firewalls followed For a long time, firewalls and computer networks were like conjoined twins. Businesses simply could Read More
1 Aug 2021Gartner.News.Press releases.ThreatQuotient How to Assess and Up-level Your Organization’s Maturity for SOAR, Gartner’s TakeHow to Assess and Up-level Your Organization’s Maturity for SOAR, Gartner’s Take MARC SOLOMON Earlier this year, Gartner published Read More
1 Aug 2021News.Versasec Passwords Do NOT Cut it: Why MFA is Critical TodayDate: 2021-07-28Author: Carolina Martinez, GM Americas Previous << Versasec Registers With FSQS NL It’s time for summer school Read More
31 Jul 2021Forcepoint.News Forcepoint NGFW MITRE ATT&CK simulationIn this scenario, an admin researches an issue, finds a potential solution on a forum. The solution provides a download link to PuTTY. Read More
31 Jul 2021Indeed Identity.News Indeed PAM 2.5: user experience is a key to resilient cybersecurityIndeed Identity presents a new version of Indeed Privileged Access Manager. Indeed PAM 2.5 offers enhanced access policy mechanisms, new features Read More
31 Jul 2021News.Opentext What’s new in OpenText Internet of Things PlatformThe latest announcement by OpenText of Cloud Editions includes some great updates to OpenText Internet of Things Platform. Check out the latest Read More
28 Jul 2021Cofense.News Reporting Matters – even for a Smishing MessageWith the increased use of mobile devices to manage so much of our lives, it’s no surprise scammers have moved to this medium to target your Read More
27 Jul 2021News.ThreatMark ThreatMark recognized as a Representative Vendor in 2021 Gartner Market Guide for Online Fraud DetectionWe are excited to announce that ThreatMark, a developer and provider of advanced fraud prevention solutions, was listed as a Representative Read More
27 Jul 2021Forcepoint.News EO 14028 is “right on time,” but challenges remain in race to develop softwareThe Cybersecurity Executive Order dictated publishing guidance outlining security measures for critical software, on Day 60 (see highlighted Read More
27 Jul 2021BeyondTrust.Gartner.News Should Your Organization Consolidate Its Service Desk Tools? | BeyondTrustShould Your Organization Consolidate Its Service Desk Tools? | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the Read More
27 Jul 2021News.Qualys Protect your Devices from Pegasus Spyware using VMDR for Mobile Devices’ Proactive ApproachPegasus spyware is in the news, and it has been used to target devices of critical people from different sectors and countries including Read More
25 Jul 2021Gartner.News.Press releases.ThreatQuotient Are You Prepared for the Surge in Ransomware?Are You Prepared for the Surge in Ransomware? ANTHONY STITT Incidents of ransomware have been increasing and evolving steadily for years as Read More
25 Jul 2021News.Versasec vSEC:CMS S6.1 announced by Joerg Dettmann, Versasec Founder and CTODate: 2021-07-21Author: Jörg Dettmann, Founder and CTO Previous << FIDO It’s a big week for our technical team and the entire company as we Read More
24 Jul 2021Forcepoint.News Can Cybersecurity Be Robust Without Being Rigid?Decisions around cybersecurity can be stressful, if not plain scary. The stakes are always high, and it seems like there’s a headline related to Read More
24 Jul 2021News.Opentext Using first-party data to deliver personalized and tailored digital experiences at scaleDelivering personalized digital experiences is getting harder even as the technology to do so gets better. As the value of third-party data is Read More
21 Jul 2021Cofense.News Cofense Delivers Industry’s First Cloud-Native Email Security for Microsoft 365 and Google Workspace – Deployable in Less than a MinuteCofense Protect MSP pairs Computer Vision (a field of artificial intelligence) that simulates how humans see, with Cofense PhishMe’s real-world Read More
20 Jul 2021News.Titus U.S. Data Privacy Gains MomentumAdam Strange · Wednesday, July 14th, 2021 As more and more social and economic activities move online, the importance of privacy and data Read More
20 Jul 2021Forcepoint.News.Webinars Boards of Directors: Cyber Risk is the Cost of Doing BusinessPrinciples for Board Governance of Cyber Risk (Report) And this absolutely raises the stakes for Boards of Directors and the critical role they Read More
20 Jul 2021BeyondTrust.News Endpoint Security vs. Network Security – Revisited | BeyondTrustEndpoint Security vs. Network Security – Revisited | BeyondTrust July 19, 2021 Open You May Also Be Interested In: Our website uses cookies Read More
20 Jul 2021News.Qualys Google Android July 2021 Security Patch Vulnerabilities: Discover and Take Remote Response Action Using VMDR for Mobile DevicesThe recently released Android Security Bulletin for July 2021 addresses 44 vulnerabilities, out of which 7 are rated as critical vulnerabilities. Read More
19 Jul 2021cPacket Networks.News cPacket Networks Accelerates Growth with New Headquarters, Expands Facilities and Its Global FootprintThe post cPacket Networks Accelerates Growth with New Headquarters, Expands Facilities and Its Global Footprint appeared first on cPacket Networks.Read More
19 Jul 2021McAfee.News White House Executive Order – Removing Barriers to Sharing Threat InformationElimination of contractual barriers that limit sharing across agencies through FAR modifications The expansion of log retention Mandatory Read More
18 Jul 2021Gartner.News.ThreatQuotient Three Approaches to an XDR ArchitectureExtended Detection and Response (XDR) can be confusing based on so many different definitions and approaches In 2020, Extended Detection and Read More
18 Jul 2021News.Versasec Versasec Joins FIDO AllianceDate: 2021-07-13Author: Jörg Dettmann, CTO Previous << Cybersecurity Denial and Cure This week, we announced we’re now members of the FIDO Read More
17 Jul 2021Forcepoint.News Forcepoint’s Deep Secure Acquisition Shapes the Future of Malware Protection within Cross Domain Solutions and Data-first SASECDR protects enterprises by deconstructing and disarming commonly used files, including MS Office, PDFs , images, etc, and rebuilding them to Read More
17 Jul 2021Indeed Identity.News Video: “PAM is a key driver to have a compliant and secure environment”The growing importance of implementing privileged access management at the corporate level is noted by leading cybersecurity analytics. They Read More
17 Jul 2021News.Opentext Why 91% of enterprises are looking for new integration solutionsEarlier this year, OpenText and IDG surveyed enterprises with more than 1,000 employees on ERP integration, including insights on their current Read More
14 Jul 2021Cofense.News The Difference Between an Attempted Attack and a Widespread Ransomware Attack is Employee ReportingThe recent Kaseya attack, in which threat actors leveraged a zero-day vulnerability over the holiday weekend, demonstrates that ransomware is Read More
13 Jul 2021News.Titus Heads up! New Canadian Data Privacy Act is Around the CornerThe time to prepare to meet soon-to-be-enacted Canadian data privacy regulations is now. Around the world, the awareness of the need to protect Read More
13 Jul 2021Forcepoint.Gartner.News Transforming from “Zero” to “Hero” with Data-first SASEMany organizations are replacing the short-term workarounds implemented during the pandemic to keep people safe, yet productive. Today, Read More
13 Jul 2021BeyondTrust.News BeyondTrust Introduces ServiceNow Integration with Privilege Management for Windows & Mac | BeyondTrustBeyondTrust Introduces ServiceNow Integration with Privilege Management for Windows & Mac | BeyondTrust July 7, 2021 Open You May Also Be Read More
13 Jul 2021News.Qualys Qualys API Best Practices: Host List Detection APIHost List Detection is your subscription’s list of hosts and their corresponding up-to-date detections including: Confirmed Vulnerability Read More
12 Jul 2021McAfee.News Adding Security to Smartsheet with McAfee CASB ConnectIn June 2021, McAfee MVISION Cloud released support for Smartsheet – providing cornerstone CASB services to Smartsheet through the CASB Read More
11 Jul 2021News.Press releases.ThreatQuotient.Webinars 5 Tips to Improve Threat Report Analysis and Action5 Tips to Improve Threat Report Analysis and Action LIZ BUSH Most organizations have more threat intelligence than they know what to do with, Read More
11 Jul 2021News.Versasec Cybersecurity Denial and its Common Sense CureCompany Blog Our blog addresses the latest security trends and stories. The posts discuss how identity and access management are playing a larger Read More
11 Jul 2021Ivanti.News Apple WWDC 2021Apple’s Worldwide Developers Conference is a week of amazing sessions that define the coming year, announce new features, and preview Read More
10 Jul 2021News.Opentext Why effective asset visibility starts at the digital twinThe cost of poor asset visibility is potentially enormous. Estimates suggest companies are losing almost $25 billion each year in the UK alone. Read More
8 Jul 2021Gartner.McAfee.News The Industry Applauds MVISION XDR – Turning Raves into BenefitsExtended Detection and Response products, better known as XDR, not only extended the capabilities of EDR platforms, but according to Gartner[1] Read More
6 Jul 2021BeyondTrust.News Privileged Access Management for DevOps – BeyondTrust Stands out as a Leader in KuppingerCole Report | BeyondTrustPrivileged Access Management for DevOps – BeyondTrust Stands out as a Leader in KuppingerCole Report | BeyondTrust June 30, 2021 Open You May Read More
4 Jul 2021News.ThreatQuotient How to infuse agility into security operationsFor many years, security professionals have talked about the OODA loop. Devised by Colonel John Boyd, it describes a decision-making cycle that Read More
3 Jul 2021Forcepoint.News Forcepoint CASB Helps Global Customers Safely Adapt to Hybrid Workplace ChangesCompanies are increasingly turning to cloud services to ensure their employees have access to important business data and resources from anywhere Read More
3 Jul 2021Forcepoint.News Forcepoint CASB Helps Global Customers Safely Adapt to Hybrid Workplace ChangesCompanies are increasingly turning to cloud services to ensure their employees have access to important business data and resources from anywhere Read More
3 Jul 2021News.Opentext OpenText employee wins The Outstanding Workers of the Republic Awards (TOWER)We are excited to announce that one of our employees, Nell D. Pagkalinawan, Principal Cloud Applications Consultant, has been recognized as one Read More
3 Jul 2021News.Riverbed SSL Certificate Management Made Simple, Secure, and at Scale | RiverbedSSL and TLS traffic are among the most common forms of secure network traffic in today’s enterprise. The Riverbed Application Acceleration Read More
2 Jul 2021News.PROFITAP Timestamp analysis: why you need it and 3 efficient ways to run itA crucial aspect of running and maintaining a network is achieving optimal performance. In the context of network monitoring, performance can be Read More
2 Jul 2021Micro Focus.News How does social responsibility relate to customer trust?Introduction Social responsibility is no longer a ‘niche’, instead it touches every industry around the world, including the software industry. Read More
1 Jul 2021McAfee.News.Webinars How to Proactively Increase Your Protection Against Ransomware with Threat IntelligenceWhich Ransomware campaigns and threat profiles are most likely going to hit you? MVISION Insights provides near real time statistics on the Read More
1 Jul 2021Allied Telesis.News Intelligent Asset Management: Riding the Wave of Predictive MaintenanceMaintenance and Repair Operations (MRO) are among the most important activities of modern industrial organizations. They enable enterprises to Read More
29 Jun 2021Forcepoint.News Spend now, pay later? Settling the score of technical debtTechnical debt is a complex concept, going back decades, and relatively simple misconfigurations like Fastly’s are just a very visible example of Read More
29 Jun 2021BeyondTrust.News.Webinars Taking PAM Back to the Basics: Privileged Password Management | BeyondTrustTaking PAM Back to the Basics: Privileged Password Management | BeyondTrust June 28, 2021 Open You May Also Be Interested In: Our website uses Read More
27 Jun 2021News.ThreatQuotient XDR is a Destination, Not a SolutionIf we define XDR as a solution, SOCs can’t reach their ultimate destination because, as a solution, XDR can’t be a holistic approach Read More
27 Jun 2021News.Versasec Another Perk of MFA: Lowered Insurance PremiumsDate: 2021-06-24Author: Carolina Martinez, General Manager Americas Previous << Governments Working Hard To Better Protect User Identities Read More
26 Jun 2021News.Opentext.Press releases What’s new in OpenText AxcelerateThe latest announcement by OpenText of Cloud Editions includes some great updates to OpenText™ Axcelerate™. Check out the latest Read More
25 Jun 2021Micro Focus.News Micro Focus Consulting. Professional. Service.I am Dr. James D. Borderick, and I look after the Competitive Benchmark research for Micro Focus, which I have been doing for over five years. I Read More
24 Jun 202124 Jun 2021Siemplify.Vendors REAL security to distribute Siemplify to serve the Southeast European region’s need for SOAR platformA distribution agreement has been concluded between Israel-headquartered Siemplify, the #1 Independent SOAR Platform, and Slovenia-based REAL Read More
24 Jun 2021Gartner.McAfee.News Transforming to a Predictive Cyber DefenseIf you’re like me, working from a home office, you can’t help but think about all of the cybersecurity tradeoffs that accompanied the Read More
23 Jun 2021Cofense.News It’s Not Safe: “Security Update” Goes Phishing via PDFFigure 1: Email Body The Cofense Phishing Defense Center (PDC) has observed a phishing campaign that aims to harvest Office365 (O365) Read More
22 Jun 2021News.Titus Data Classification Best PracticesAdam Strange · Monday, June 21st, 2021 Data classification tools not only help organizations to protect their data, they also help users Read More
22 Jun 2021Forcepoint.News Securing the Workforce of the Future – ForcepointFujitsu’s Head of Strategy and Growth, Workforce and Workspace Services, Andy Davis joined Forcepoint to discuss the changes and measures Read More
22 Jun 2021BeyondTrust.News IDSA Study Shows IT Leaders Embracing Identity-Centric Security to Close Remote Work & DX Gaps | BeyondTrustIDSA Study Shows IT Leaders Embracing Identity-Centric Security to Close Remote Work & DX Gaps | BeyondTrust June 18, 2021 Open You May Also Read More
21 Jun 2021McAfee.News Testing to Ensure Your Security Posture Never SlouchesTake, for example, the May 7th DarkSide ransomware attack that shut down Colonial Pipeline’s distribution network. That well-publicized Read More
20 Jun 2021News.ThreatQuotient ThreatQuotient Recognized as Best Security Investigation Platform by 2021 CDM Global Infosec AwardsRecent Award Wins Highlight Innovative Threat Intelligence and Security Investigation Capabilities, Women in Cybersecurity Leadership Reston, Va. Read More
20 Jun 2021News.Versasec As PKI Requirements in Government Agencies Grow, Versasec is there to HelpDate: 2021-06-17Author: Carolina Martinez, General Manager Americas Previous << MFA Could Have Prevented Pipeline Attack Better protecting Read More