Category: News
Automating Vulnerability Management with Qualys VMDR & ServiceNow
Table of Contents With a growing number of cyber-attacks and the push to stay ahead of adversaries, the Vulnerability Management lifecycle has become necessary for ensuring enterprise-grade cyber resiliency. For […]There’s a New and Potentially More Dangerous Arrow in Cupid’s Quiver
There’s a New and Potentially More Dangerous Arrow in Cupid’s Quiver Julia Weifenbach It’s Valentine’s Day and love is in the air. Flowers, candy, cards and dinner are some of […]Security News—ChatGPT and Cybersecurity, Ukraine Cyberwar Lessons, ICS Vulnerabilities, Mirai Botnet Variant and More
AI chatbots, such as ChatGPT from OpenAI, can be used to help facilitate malicious cyber activities, even though the terms of service of these AI-driven tools ban cybercrime activities. Cybercriminals […]ChatGPT and Digital Experience Management – How’s the Weather Where You Are?
Like many, I enjoyed seeing the responses that people have received by asking various questions to OpenAI’s ChatGPT. In the last week, I’ve read poetry, essays and even definitions of […]Zero Trust CDR for Mail: Microsoft 365 is Here!
That’s why Forcepoint’s new Zero Trust Content Disarm and Reconstruction (CDR) for Mail is built specifically for Microsoft 365 Mail. Pivoting away from detection-based protection, Zero Trust CDR for Mail: […]New Survey Reveals Zero Trust Challenges for Singapore… | BeyondTrust
In light of changing work habits and digital transformation initiatives, organisations around the world have looked to adopt zero trust as their cybersecurity approach. The “never trust, always verify” philosophy […]Real-Time Defense of Multi-Cloud Environments From Malicious Attacks and Threats
Table of Contents Organizations today cannot detect real-time threats at runtime due to the multi-cloud infrastructure, resulting in the possibility of malicious actors exploiting the environment. It is imperative for […]ISO 27001 welcomes Threat Intelligence
ISO 27001 welcomes Threat Intelligence Ramiro Céspedes Introduction In my previous article I defined what is Cyber Threat Intelligence (CTI), described how to measure it and explained why it is […]Taming the Data ROT Beast
Data within organizations tends to literally multiply through duplicates, duplicates of duplicates, etc. This is a problem often referred to as redundant data. Data also can no longer be valid. […]Meet Patricia Arguello Rojo: Senior Frontend Developer
Software, from vision to execution, is a people business – and at Micro Focus our people are our greatest asset. Helping our employees build exciting and enriching careers is a key […]Load More