Category: News
2021 Cybersecurity Outlook: Attackers vs. Defenders
COVID-19, One Year Later 2020 was undoubtedly a defining year for cybersecurity – a year that ended with the SolarWinds breach, which infiltrated US government agencies and organizations at a […]March Patch Tuesday 2021
There was an interesting start to March, with four Exchange Server exploits and an out of band update. There is an additional Zero Day vulnerability being exploited in Internet Explorer and […]Why MITRE ATT&CK Matters?
To enable practitioners in operationalizing these strategies, the knowledge base provides the “why” and the “what” with comprehensive documentation that includes the descriptions and relational mappings of the behaviorsMeeting with A Phish: Zoom-Themed Phish in Use
The importance of having contactless, digital conferencing software (such as Zoom or Microsoft Teams) is well understood by many companies worldwide. COVID-19 has completely changed the way people work, and the Phishing […]VPNs: Will Zero Trust & Improved Secure Architectures Spell the End? | BeyondTrust
VPNs: Will Zero Trust & Improved Secure Architectures Spell the End? | BeyondTrust Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free Dismiss March […]Qualys Update on Accellion FTA Security Incident
Note: Updated March 4 with additional detail. New information has come out today, March 3, related to a previously identified zero-day exploit in a third-party solution, Accellion FTA, that Qualys […]The Fastest Route to SASE
Decision makers seek a faster, more efficient high road to cloud and network transformation without compromising security. The need for speed and scalability is crucial, but corners cannot be cut […]Women in Cybersecurity – Katie Teitler – Tag Cyber
Women in Cybersecurity PROFILE – KATIE TEITLER Katie TeitlerTAG Cyber – Senior Cyber Security Analyst What do you do at Tag Cyber?TAG Cyber is a cyber security analyst firm […]Advancements in Invoicing – A highly sophisticated way to distribute ZLoader
Spam campaigns using this new distribution chain first started to appear in early February 2021. The content of the emails follow the long-standing simplistic style of invoicing scams. While the […]What’s new in Vendor Invoice Management CE 20.4
Currently, there are vast computing powers available to the end customer. However, this can cause complete chaos when it comes to managing the entire IT landscape. Organizations often have disconnected […]Load More