Category: News
In Case of Emergency: Securing “Break-the-Glass” Access Protocols
It’s never been more important for workers who are feeling sick to stay home, so many hospitals have faced staffing shortages that threaten to disrupt operations and the continuity of […]How a global research and manufacturing company achieves regulatory compliance
As a Contract Research and Manufacturing organization with over 330 clients around the globe, regulatory compliance is non-negotiable for Syngene International. Its integrated scientific solutions necessitate careful documenting of trials, […]Centrify Delegated Machine Credentials – Modern IAM for Machines and Services
Centrify was founded on the idea of centralizing identity and access management across the heterogeneous enterprise within Active Directory. More specifically, this meant the integration of UNIX and Linux systems […]Emulation of Malicious Shellcode With Speakeasy
In order to enable emulation of malware samples at scale, we have developed the Speakeasy emulation framework. Speakeasy aims to make it as easy as possible for users who are […]Post-Sales Support – Done Right For A Rocking Net Promoter®
How do we Measure Post-Sales Support? Micro Focus uses double-blind competitive benchmarking in order to gauge how well we are doing against the competition. This strategy means we can understand […]Top Three Things I’m Looking Forward to at VMworld 2020
VMworld 2020 (September 29 to October 1) is right around the corner. This year’s event is entirely virtual and offers a unique way for all attendees to engage with the […]McAfee ESM Named a 2020 Gartner Peer Insights Customers’ Choice for SIEM
We are most appreciative of our customers who support our solutions and share their opinions through forums like Gartner Peer Insights. The voice and passion of our customers is instrumental […]A Hands-On Introduction to Mandiant’s Approach to OT Red Teaming
Operational technology (OT) asset owners have historically considered red teaming of OT and industrial control system (ICS) networks to be too risky due to the potential for disruptions or adverse […]Integrating Checkmarx Security Results within GitLab
Announced today, we’re thrilled to share that CxSAST, CxSCA, and CxCodebashing all now integrate seamlessly within GitLab’s ecosystem via CxFlow: Checkmarx’s scan and result orchestration application. The automation and integration […]Humans and Machines – Phishing Mitigation Automation SOARing to New Heights
Cofense and Palo Alto Networks Cortex XSOAR integrate to counter phishing threats that evade secure email gateways (SEGs). Human-verified phishing indicators and automation squelch attackers. Cofense Intelligence, Cofense Triage and […]Load More