Category: News
“Best of Breed” – CASB/DLP and Rights Management Come Together
Enter the cloud Most organizations now consider cloud services to be essential in their business. Services like Microsoft 365 (Sharepoint, Onedrive, Teams), Box, and Slack are depended upon by all […]Threat Found: Integrating With FireEye Detection On Demand
Threats can and do come from everywhere, and every organization approaches security differently based on their needs, industry and environment. But the one thing organizations all have in common is […]Cybersecurity Awareness Month Week 1: Day in the Life, Security Researcher
Have you ever wondered what a typical day looks like for a security researcher? If so, you’ve come to the right place! We’re kicking things off with Erez Yalon, Checkmarx’s […]Security Awareness: Choosing Methods and Content that Work
Last week we examined the importance of setting a strategy and goals for your security awareness program. Part 2 in our 4-part series in support of National Cybersecurity Awareness Month. […]Shifting Gears from IOCs to IOBs
The after-the-fact nature of IOCs is one of their clearest limitations. They are documentation artifacts (hash of a file, reputation of an IP, known-bad URLs, in-memory footprint, etc) based on […]BeyondTrust Expands Cloud Leadership with Password Safe SaaS | BeyondTrust
BeyondTrust Expands Cloud Leadership with Password Safe SaaS | BeyondTrust Join Us for Go Beyond – Our Virtual Customer Conference October 19-22, 2020 Register Now Dismiss October 7, 2020 Open […]ThreatQuotient Listed in Gartner’s 2020 Market Guide for Security Orchestration, Automation and Response Solutions
ThreatQ platform’s data-driven approach to SOAR can free-up two to three full-time security analysts for higher level tasks Reston Va. – Oct. 7, 2020 – ThreatQuotient, a leading security operations […]Mandiant Executive Intelligence Briefing: Election Security Edition
With less than a month before the U.S. elections on Nov. 3, the race is on to protect the democratic process. Mandiant Threat Intelligence is tracking the threats that matter […]Coffee Talk With Ivanti Insiders on International Coffee Day
Name What is your favorite coffee drink? How do you take your coffee? What is your favorite fall/winter coffee drink? Favorite snack to have with your coffee? Aldo Gil, System […]Five Takeaways to Build a Resilient Cybersecurity Strategy
1. Enable remote classified access With people as the new perimeter, cross domain solutions provide remote classified access, while Zero Trust helps ensure security. But resiliency relies on more than […]Load More