Category: News
FireEye Shares Details of Recent Cyber Attack, Actions to Protect Community
FireEye is on the front lines defending companies and critical infrastructure globally from cyber threats. We witness the growing threat firsthand, and we know that cyber threats are always evolving. […]December Patch Tuesday 2020
For all of you who have asked for a pause to Patch Tuesday, you did not get exactly what you wanted for Christmas, but close. December Patch Tuesday is the […]Amazing Grace Hopper – HAPPY BIRTHDAY
When a bright, 30-something persuaded the authorities to waive the restrictions on age and weight, and joined the US Navy in 1944, no-one could have foreseen the profound benevolent impact […]Protect Yourself from Holiday Cyber Threats – Ask the Howlers, Episode 16 Highlights
In episode 16 of “Ask the Howlers,” host Stacia Tympanick, senior solution engineer, met up with Ryan Hendricks, staff architect and manager, to discuss the latest topics concerning cybersecurity impacting […]Securing Containers with NIST 800-190 and MVISION CNAPP
As more enterprises adapt to cloud-native architectures and embark on multi-cloud strategies, demands are changing usage patterns, processes, and organizational structures. However, the unique methods by which application containers are […]Unauthorized Access of FireEye Red Team Tools
Overview A highly sophisticated state-sponsored adversary stole FireEye Red Team tools. Because we believe that an adversary possesses these tools, and we do not know whether the attacker intends to […]Seven Ways We’ve Helped our Partners Transform to Digital Reality During COVID
Among organizations that experienced a sudden and dramatic interruption to “business as usual” were the many resellers that market software around the world. These businesses–many of them our valued partners […]You Must Quarantine! Fake Office 365 Email Leads to Curiosity
The Cofense Phishing Defense Center (PDC) has discovered a recent phishing campaign that has targeted Office 365 users and includes a convincing Microsoft quarantine notification reference. The campaign was found in an environment protected byZero Trust Network Access (ZTNA) Replaces Implicit Trust with Explicit Trust
Cloud applications were no problem for newly remote workers to get to (which provided a lot of motivation to switch to SaaS apps where possible). But private apps in internal […]Demystifying Azure PIM: What it is, How it Works, What it Doesn’t Do | BeyondTrust
Demystifying Azure PIM: What it is, How it Works, What it Doesn’t Do | BeyondTrust December 7, 2020 Open You May Also Be Interested In: Our website uses cookies to […]Load More