Category: News
Boards of Directors: Cyber Risk is the Cost of Doing Business
Principles for Board Governance of Cyber Risk (Report) And this absolutely raises the stakes for Boards of Directors and the critical role they play in an organization’s cyber resilience strategy. […]Endpoint Security vs. Network Security – Revisited | BeyondTrust
Endpoint Security vs. Network Security – Revisited | BeyondTrust July 19, 2021 Open You May Also Be Interested In: Our website uses cookies to provide a better user experience, personalize […]Google Android July 2021 Security Patch Vulnerabilities: Discover and Take Remote Response Action Using VMDR for Mobile Devices
The recently released Android Security Bulletin for July 2021 addresses 44 vulnerabilities, out of which 7 are rated as critical vulnerabilities. The vulnerabilities affect open-source components such as the Android […]cPacket Networks Accelerates Growth with New Headquarters, Expands Facilities and Its Global Footprint
The post cPacket Networks Accelerates Growth with New Headquarters, Expands Facilities and Its Global Footprint appeared first on cPacket Networks.White House Executive Order – Removing Barriers to Sharing Threat Information
Elimination of contractual barriers that limit sharing across agencies through FAR modifications The expansion of log retention Mandatory reporting requirements for government technology and service partners Standards-based incident sharingThree Approaches to an XDR Architecture
Extended Detection and Response (XDR) can be confusing based on so many different definitions and approaches In 2020, Extended Detection and Response (XDR) solutions started being touted as the number one trend […]Versasec Joins FIDO Alliance
Date: 2021-07-13Author: Jörg Dettmann, CTO Previous << Cybersecurity Denial and Cure This week, we announced we’re now members of the FIDO Alliance, an open industry association focused on creating authentication […]Forcepoint’s Deep Secure Acquisition Shapes the Future of Malware Protection within Cross Domain Solutions and Data-first SASE
CDR protects enterprises by deconstructing and disarming commonly used files, including MS Office, PDFs , images, etc, and rebuilding them to new, sanitized file. Through this process, malicious content is […]Video: “PAM is a key driver to have a compliant and secure environment”
The growing importance of implementing privileged access management at the corporate level is noted by leading cybersecurity analytics. They mention that “by 2024, organizations that use privileged task automation features […]Why 91% of enterprises are looking for new integration solutions
Earlier this year, OpenText and IDG surveyed enterprises with more than 1,000 employees on ERP integration, including insights on their current system landscape, integration requirements, key challenges, and future plans. […]Load More