Category: News
Why Zero Trust is so hot right now – and how Titus helps make it happen
Home » Blog » Why Zero Trust is so hot right now – and how Titus helps make it happen Matthew McCormick · Monday, August 24th, 2020 If Mugatu (of […]Today’s Cybersecurity Challenges Require Professionals Who Understand What They’re Protecting and Why
All of this makes it more critical than ever that the cybersecurity warriors inside your company understand how your business operates in order to understand how best to protect it. […]macOS Security: Managing Privileged Access & Credentials | BeyondTrust
macOS Security: Managing Privileged Access & Credentials | BeyondTrust August 24, 2020 Open You May Also Be Interested In: Our website uses cookies to provide a better user experience, personalize […]Automated Discovery and Assessment of PaaS Databases with Lambda Service for Qualys Policy Compliance
In the last several years, Platform as a Service (PaaS) solutions have evolved and matured. As organizations have focused on digital transformation, there has been a major shift towards adopting […]The Economic Benefits from McAfee’s UCE Solution
The cloud transformation that we are seeing today is happening across several dimensions. Companies are rapidly moving from their private data centers to hybrid cloud models with Cloud Service Providers. […]Spike in Cloud Attacks Shows Businesses were not Prepared to Work from Home
Spike in Cloud Attacks Shows Businesses were not Prepared to Work from Home POSTED BY RYAN TROST Businesses continue to place more and more data in the cloud, from personal […]How Strategic Intelligence Helps Organizations Make Sense of the Threat Landscape
The Strategic Analysis team at Mandiant Threat Intelligence examines hundreds of discrete data points from numerous sources, distilling trends from that raw information to identify the most important, common, and […]A New Way to Think About Breach Detection
Data breaches can cripple businesses. While it’s true the financial implications tend to be significant—both in terms of revenue loss and potential fines—breaches often cut deeper, especially when they result […]Keeping up the fight on cancer during pandemic
In just a few months, COVID-19 changed the world. Millions have been infected and hundreds of thousands have died at the time of writing. This health emergency has strained healthcare […]Combat Data Breaches, Weak Passwords, and Phishing Attacks with Multi-Factor Authentication
Forrester Research has estimated that 80 percent of security breaches involve weak, default, stolen, or otherwise compromised privileged credentials. Since organizations lack the ability to verify whether the user accessing […]Load More