Category: News
Introduction from BeyondTrust’s New CEO: Janine Seebeck | BeyondTrust
Today is an exciting day for me personally and for BeyondTrust, as I officially assume the role of CEO. After six years in leadership roles at BeyondTrust, including Chief Operating Officer and Chief Financial Officer, I’m honored to move intoAtlassian Confluence OGNL Injection Remote Code Execution (RCE) Vulnerability (CVE-2022-26134)
On June 02, 2022, Atlassian published a security advisory about a critical severity Unauthenticated Remote Code Execution vulnerability affecting Confluence Server and Data Center. According to the advisory, the vulnerability is being activelyThe Current State of Intelligent Automation Adoption in Cybersecurity
The Current State of Intelligent Automation Adoption in Cybersecurity Cyrille Badeau In the past year, research indicates that nearly a third of organizations have accelerated their plans to automate key security and IR processes, while anotherDigital Experience Innovation & Acceleration
IT für eine erfolgreiche Digitalisierung und Cloud-Migration modernisieren Um von digitalen und cloudbasierten transformativen Technologien zu profitieren, müssen Unternehmen ihre IT-Infrastruktur modernisieren. Das gelingt jedoch nicht überInsider Risk and the Great Resignation: Preventing Critical Data Loss When Employees Leave
Here are some sobering facts about the risks of departing employees: The ex-Pfizer employee is one of tens of millions of people around the world who have quit their jobs in recent months, as part of a global wave of departures called the “GreatThe Dark Side of Microsoft Windows
There is no denying that Microsoft Windows has a clear market advantage when it comes to their IT ecosystems. No other vendor has produced a successful server and desktop operating system pair that excels in compatibility, authentication,Risk-based Remediation Powered by Patch Management in Qualys VMDR 2.0
According to the recently released Verizon DBIR report, vulnerability exploitation continued to be one of the top three attack vectors exploited by bad actors in 2021 to break into organizations. As of this writing, it’s only June, but more thanSecurity Orchestration: Beware of the Hidden Financial Costs
Among the many improvements in cybersecurity technology and tools we’ve seen over the last few years, one of the most significant has been the inclusion of security automation and orchestration capabilities in solution categories beyondLoad More