Category: News
Women in Security: Celebrating Women’s History Month
In celebration of Women’s History Month, we are honoring all of the women at VMware who inspire, lead, innovate and set the stage for the next generation to come. In […]Hacking Proprietary Protocols with Sharks and Pandas
This course of events demands that both offensively and defensively minded “good guys” band together to remove the unknown from as much technology as possible. One of the most common […]REAL Security The Wall-builder of the year 2020
We are honoured to receive recognition for our efforts and especially expertise in Next Generation Firewall field from our long term loyal and really cool partner, Forcepoint, at 2021 Partner Sales […]WEBINAR CyberSocial: Analysis of a Threat Report and how to make it actionable?
In this CyberSocial, ThreatQuotient and FireEye will cover the response process from initial threat report to the action taken, to the operationalisation. In this discussion, our panelists will talk of these key aspects: How […]Fixing Network Performance Issues Before Users Notice | Unified NPM | Riverbed
This reactive modality can create a material impact to user productivity and has a knock on effect that impacts the organisation’s customers and partners if the issue is pervasive. Unfortunately, […]Fixing Network Performance Issues Before Users Notice | Unified NPM | Riverbed
For many organisations, the status quo involves IT teams troubleshooting and firefighting network and application performance issues after users have called the help desk to complain about them. This reactive […]Up and Coming Phishing Campaign Is Taxing to Users
With U.S. tax season upon us, it’s time to remind our users to watch for emails hitting their inboxes related to tax documents. Threat actors are tuned to the seasonal theme to lure users. The Cofense Phishing […]How to Manage and Secure Service Accounts: Best Practices | BeyondTrust
How to Manage and Secure Service Accounts: Best Practices | BeyondTrust Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free Dismiss February 25, 2021 […]Bringing network visibility to unmanaged power utility substations
Profitap was tasked by a leading power utility company in a South-central State in the USA to provide network visibility to a group of unmanaged power substations that are moving […]PCI Compliance – What is it, why is it needed and who needs to comply?
Payment processing security has, in technology terms a long history. Toward the end of 2004, five major credit card companies (American Express, Discovery Financial Services, JCB International, MasterCard, and Visa […]Load More