27 Dec 2021Micro Focus.News Every Hero Needs a SidekickIn the rush towards digital transformation, even the heroic CIO needs someone they can turn to, says Derek Britton. Who is in your corner to help Read More 25 Dec 2021Forcepoint.News Cashing in on CryptoIf proof were needed, regulators in both the UK and USA have just published guidance on cryptocurrencies for banks and financial institutions. Read More 23 Dec 2021McAfee.News Threat Intelligence and Protections Update Log4Shell CVE-2021-44228CVE-2021-44228 – Apache Releases Log4j Version 2.15.0 to Address Critical RCE Vulnerability Under Exploitation. Threat Summary Read More 21 Dec 2021Forcepoint.News.Webinars Securing the Perimeter of Higher Education – A Fireside Chat with SUNY PlattsburghHigher education institutions of today must practice a delicate balancing act of delivering a high-quality, uninhibited student experience while Read More 21 Dec 2021BeyondTrust.News CVE-2021-44228 or “Log4Shell” is a remote code execution zero-day vulCVE-2021-44228 or “Log4Shell” is a remote code execution zero-day vulnerability in the Apache Log4j2 library, originally disclosed on Read More 21 Dec 2021News.Qualys Qualys Integrates with Shodan to Help Map the External Attack SurfaceQualys CyberSecurity Asset Management (CSAM) now natively integrates with Shodan to enable cybersecurity teams to identify all assets visible on Read More 19 Dec 2021News.Press releases.ThreatQuotient.Webinars Run out of Netflix options? Check out our Most Popular Webinars for 2021Run out of Netflix options? Check out our Most Popular Webinars for 2021 KASEY ELLO We’re fortunate to have a depth and breadth of Read More 18 Dec 2021Forcepoint.News Forcepoint Security News: Log4Shell Vulnerability, Pfizer Trade Secrets Exfiltration, Classifieds Site Leaked Personal Info via the F12 Key, and Hive Ransomware Enters Big LeagueThe recently discovered Log4Shell vulnerability in the popular open source Log4j logging software lets an attacker gain access to a vulnerable Read More 18 Dec 2021News.Riverbed Zoom, Teams, DNS and New TCP Analysis Extract Application and Network Intelligence | Riverbed|AternityWith the vast bulk of the world’s white-collar workforce working from home during the COVID-19 pandemic, there was an explosion in demand for Read More 17 Dec 2021Micro Focus.News Update on Micro Focus Response to “Log4j” VulnerabilityDecember 15, 2021 Updates: Micro Focus is taking immediate action regarding Common Vulnerabilities and Exposures CVE-2021-44228 and Read More 14 Dec 2021Forcepoint.News Cool Heads and Hot WalletsWhy is Cryptocurrency so hot? Rising inflation is devaluing cash reserves by the day, making crypto an ever more attractive investment Read More 14 Dec 2021BeyondTrust.Gartner.News.Webinars Managing Privileged Access across Multicloud IT Environments | BeyondTrustAdmin, superuser, root – different names for the same concept: an account that has total control over a system. In the Windows world, this Read More 14 Dec 2021News.Qualys Developing a Repeatable and Sustainable Security Exploitable Risk Reporting ProgramIntroduction The key to creating a practical Reporting Philosophy is/are well-written vulnerability management policies, standards, and Read More 13 Dec 2021McAfee.News Log4Shell Vulnerability is the Coal in our Stocking for 2021What is it? The vulnerability exists in the way the Java Naming and Directory Interface (JNDI) feature resolves variables. When a JNDI Read More 12 Dec 2021News.Press releases.ThreatQuotient The Threat Model as a CompassThe Threat Model as a Compass ANTHONY STITT The purpose of the Cyber Threat Intelligence (CTI) team is to understand the cyber threat environment Read More 11 Dec 2021Forcepoint.News.Webinars Product Spotlight—Bitglass Platform DLP December 14Because it’s built with familiar policy models, you won’t need to reinvent your approach and policies as you move to the cloud. Bitglass’ Read More 7 Dec 2021News.Titus Take the best-of-breed track to implementing data classificationDownload our infographic The post Take the best-of-breed track to implementing data classification appeared first on Titus. This post was first Read More 7 Dec 2021Forcepoint.News Dr. Andrew Hammond Talks Cyber Espionage, Spy Museum and MoreIndeed, the desire to know what an adversary is doing is hardly a new one. Instead, technology and the role of the intelligence agent have Read More 7 Dec 2021BeyondTrust.News BeyondTrust Launches Cloud Privilege Broker for Control Over Multicloud Permissions & Entitlements | BeyondTrustIt is my pleasure to announce the release of BeyondTrust Cloud Privilege Broker, a new solution built from the ground up to help our customers Read More 5 Dec 2021News.Press releases.ThreatQuotient.Webinars What Does Sun Tzu Have to Do with XDR? More Than You Might Think!What Does Sun Tzu Have to Do with XDR? More Than You Might Think! ANTHONY PERRIDGE Military general and philosopher Sun Tzu once led the largest Read More 4 Dec 2021Forcepoint.News Forcepoint Security News: GoDaddy Breach Widens, Panasonic Confirms Cyberattack, California Pizza Kitchen Serves Up Employee SSNs, and Political CyberattacksGoDaddy Breach Widens, Includes Reseller Subsidiaries Panasonic Confirms Cyberattack and Data Breach California Pizza Kitchen Serves Up Employee Read More 2 Dec 2021McAfee.News The Bug Report – November EditionCVE-2021-20322: Of all the words of mice and men, the saddest are, “it was DNS again.” Your Cybersecurity Comic Relief To Read More 30 Nov 2021Forcepoint.News Product Spotlights: Network Security Session Coming December 7All of these elements have opened a Pandora’s box. A Robert Half survey found that 49% of employees prefer a hybrid work arrangement that Read More 30 Nov 2021News.Qualys It’s a Wrap! QSC 2021 Las Vegas Laid Out Problems, Solutions and InnovationAlthough organizations have made moves toward it for years, digital transformation, in a way, has only just begun. The pandemic may have Read More 29 Nov 2021McAfee.News.Webinars McAfee Enterprise Defender Blog | CISA Alert: MS Exchange & Fortinet VulnerabilitiesThreat Summary On November 17, 2021, The US Cybersecurity & Infrastructure Security Agency (CISA) pushed an Alert entitled “Iranian Read More 28 Nov 2021News.Press releases.ThreatQuotient Integration of the ThreatQ platform into McAfee Enterprise infrastructureIntegration of the ThreatQ platform into McAfee Enterprise infrastructure EUTIMIO FERNANDEZ Proper management of threat data is critical in Read More 27 Nov 2021News.ThreatMark ThreatMark Recognized Top 5 in Deloitte’s 2021 Technology Fast 50 CEThreatMark, provider of the most advanced online fraud prevention solution in the market, has been recognized in the Top 5 Deloitte’s 2021 Read More 25 Nov 2021Gartner.McAfee.News Global Technology Provider Looks to MVISION Unified Cloud EdgeTo better serve its customers and secure its own environments, one global technology provider decided to expand its existing on-premises data Read More 23 Nov 2021BeyondTrust.News.Webinars Multicloud Security & Permissions Management: Practical Tips | BeyondTrustHere is a question to consider: How many cloud solutions does each organization need? If your organization wishes to remain competitive – the Read More 23 Nov 2021News.Qualys Euronet Worldwide: Speedy, Global Response to Threats Reduces RiskAfter years of using manual processes and systems to manage its IT inventory and track vulnerabilities, racking up costs, and increasing the Read More 22 Nov 2021McAfee.News Ransomware Threats Affecting the Public SectorIn June 2021 the G7 economies urged countries that may harbor criminal ransomware groups to take accountability for tracking them down and Read More 21 Nov 2021News.Niagara Networks Resolving the Packet Duplication ChallengesSeamless monitoring of network traffic is critically important for enterprise network and security administrators: it lies at the very foundation Read More 21 Nov 2021Gartner.News.ThreatQuotient Acronyms Aside, the SOC of the Future Needs These 3 CapabilitiesEvery discipline has its acronyms, but I’d venture to say cybersecurity has more than its share. We use them to describe threat actors and Read More 20 Nov 2021Forcepoint.News The Rise of Tractor Hackers and Smart City AttackersBy trying to remove the overhead of humans through automation, food producers and farmers have incidentally built their businesses on an Read More 18 Nov 2021Gartner.McAfee.News Qualities of a Highly Available CloudMVISION UCE, our data-centric, cloud-native Security Service Edge (SSE) security platform, derives its capabilities from McAfee Read More 16 Nov 2021Forcepoint.News SolarWinds CEO Talks Sunburst Attack, SecurityDon’t miss this insightful and inspiring discussion, part of Forcepoint’s To The Point podcast series named to FedTech’s Top 30 Federal IT Read More 16 Nov 2021BeyondTrust.News Proactive PAM Defenses against LightBasin (UNC1945) & other Advanced Attackers | BeyondTrustOn October 19, 2021, CrowdStrike released a detailed analysis of a cyberattack waged on telecommunications companies by a group dubbed LightBasin Read More 16 Nov 2021News.Qualys Microsoft & Adobe Patch Tuesday (November 2021) – Microsoft 55 Vulnerabilities with 6 Critical, 6 Zero-Days. Adobe 4 VulnerabilitiesMicrosoft Patch Tuesday – November 2021 Microsoft patched 55 vulnerabilities in their November 2021 Patch Tuesday release, of which six are rated Read More 15 Nov 2021McAfee.News Veterans Day & Remembrance Day 2021When were you drafted or when did you enlist/join? What branch of the military did you serve and in what rank? Shannon Clancy joined October 5, Read More 15 Nov 2021Micro Focus.News If We Really Want to Drive Change, We Have to Work TogetherThe final INSPIRE 20 podcast looks back at a number of the ways that individuals are promoting inclusion and diversity in their own lives and how Read More 14 Nov 2021News.Press releases.ThreatQuotient ThreatQuotient dévoile ThreatQ v5 : pour soutenir le SOC du futur avec des capacités clés de gestion des donnéesL’approche axée sur les données, l’architecture d’open intégration et l’automatisation Read More 13 Nov 2021Forcepoint.News Security News: U.S. Offers DarkSide Bounty, Nobelium Campaigns Continue, and International Ransomware AttacksU.S. Cracks Down on Ransomware, Offers $10 Million Bounty for DarkSide Info Nobelium, The Hackers Behind SolarWinds Attack, Targets IT Supply Read More 13 Nov 2021News.Opentext An open letter to anyone switching their supply chain integration servicesDear Reader, If you’re here then you are at least marginally associated with some aspect of your company’s Read More 11 Nov 202111 Nov 2021Group-IB.News.Webinars See Your Company Through The Eyes Of The HackerFew corporate breaches actually involve zero-day vulnerabilities or advanced exploits. Instead, those breaches result from ordinary Read More 11 Nov 2021McAfee.News Legendary Entertainment Relies on MVISION CNAPP Across Its Multicloud EnvironmentLegendary Entertainment is a global media company with multiple divisions including film, television, digital studios, and comics. Under the Read More 9 Nov 2021Forcepoint.News Security News: REvil Group Taken Offline by Feds, Attacker Activities and a VPN Company Exposes DataREvil Ransomware Gang Taken Offline (Again) by FBI DarkSide Moves to Cash Out $7m in Bitcoin Acer Confirms Second Cyberattack Within a Week of Read More 9 Nov 2021BeyondTrust.News SSD Advisory – macOS Finder RCE & How Privilege Management for Mac Can Mitigate It | BeyondTrustThe SSD Advisory in macOS Finder RCE, discovered last month by independent security researcher, Park Minchan, underscores the need for having Read More 9 Nov 2021News.Qualys CSPM Evolution – Start Secure, Stay SecureFor the last several years, the Verizon DBIR report has identified misconfigurations, errors that are unintended actions by an internal party, as Read More 7 Nov 2021News.Press releases.ThreatQuotient Cybersecurity Breakthrough Awards Names ThreatQuotient Security Automation Solution of the YearCybersecurity Breakthrough Awards Names ThreatQuotient Security Automation Solution of the Year MARC SOLOMON With thousands of tools and Read More 6 Nov 2021Forcepoint.News Beware the NetSec PretendersAt Forcepoint, that simply isn’t how we do business. We do security. But, if we’ve made such big strides forward, then how is it that cyber Read More 6 Nov 2021News.Opentext A staged approach to achieving clinical data intelligenceIn 1925, inventor Hugo Gernsbacher suggested a remote control device for physicians and called it ‘Teledactyl,’ effectively Read More 4 Nov 2021McAfee.News The Bug Report – October EditionApache server version 2.4.50 (CVE-2021-42013) Your Cyber Security Comic Relief Apache: CVE-2021-41773 and CVE-2021-42013 What is it? 2 CVES / 1 Read More 3 Nov 2021cPacket Networks.News cPacket Networks Extends Cloud Visibility with Microsoft Azure Gateway Load BalancerThe post cPacket Networks Extends Cloud Visibility with Microsoft Azure Gateway Load Balancer appeared first on cPacket Networks.Read More 3 Nov 2021News.Riverbed Hybrid Work Global Survey 2021 | Riverbed | AternityWe get it, hybrid work is important and here to stay. But shifting to a high-performing hybrid work model is challenging and elusive for most Read More 3 Nov 2021News.Riverbed Hybrid Work Global Survey 2021 | Riverbed | AternityHybrid work is the new norm and critical to organizational success—but the question is, are you ready to support the hybrid workplace? To assess Read More 3 Nov 2021Cofense.News Cofense General Counsel and Chief Privacy Officer Shane McGee to Speak At 2021 RSA ConferenceLeesburg, Va. – May 6, 2021 – Cofense, the leading provider of phishing detection and response (PDR) solutions, today announced that the Read More 2 Nov 2021News.Titus Why You Need A Specialist Provider – Getting The Product Support You Need Home » Titus Blog » Why You Need A Specialist Provider – Getting The Product Support You Need Georgina Stockley · Monday, November 1st, Read More 2 Nov 2021BeyondTrust.News 2021 Survey of Evolving Cyber Threats in the Public Sector: Key Takeaways | BeyondTrustPublic sector IT teams are leaning into digital transformation and increasing their reliance on automation (such as robotic processing Read More 2 Nov 2021News.PROFITAP Profitap Supervisor Release NotesWith network growth ever on the rise, it can become more and more difficult to implement, manage, and maintain monitoring equipment such as Read More 2 Nov 2021News.Qualys Apache HTTP Server Path Traversal & Remote Code Execution (CVE-2021-41773 & CVE-2021-42013)On October 4, 2021, Apache HTTP Server Project released Security advisory on a Path traversal and File disclosure vulnerability in Apache HTTP Read More 1 Nov 2021McAfee.News McAfee Enterprise & FireEye 2022 Threat PredictionsRansomware, nation states, social media and the shifting reliance on a remote workforce made headlines in 2021. Bad actors will learn from this Read More 1 Nov 2021Micro Focus.News Micro Focus Post-Sales: SupportedI am Dr. James D. Borderick, and I look after the Competitive Benchmark research for Micro Focus, which I have been doing for over five years. I Read More 31 Oct 2021News.ThreatQuotient 3 Questions for MDRs Helping to Get Your Enterprise to XDRAn XDR implementation can quickly turn into a very large consulting project requiring significant time and budget As cybersecurity professionals Read More 30 Oct 2021Forcepoint.News Cyberattacks: Now Part of the Military ArsenalWhile the U.S. has used cyber strategy for warfare in the past, it can be used against the U.S. too. Stuxnet was an outlier at the time. But we Read More 30 Oct 2021News.Opentext Is empathy drowning in a sea of data?The idea of the family doctor has passed into history. In fact, fewer and fewer Americans have a primary care provider. Yet empathy is, and must Read More 29 Oct 2021Micro Focus.News COP26: Our Actions Today Impact Tomorrow; Take Part in “Count Us In” ProjectThis year’s COP26, the UN Climate Change Conference, is a key event in 2021. As world leaders come together to commit to urgent global climate Read More 28 Oct 2021McAfee.News.Webinars Why an Ounce of Cybersecurity Prevention is Worth a Pound of DetectionAt that point, you’re looking to find out what your adversaries have seen or stolen, you want to plug the holes that enabled the hack and Read More 27 Oct 2021News.ThreatMark ThreatMark attracts additional funding; appoints Daniel Rawlings as new CEO & President to lead the next phase of expansion & growthPrague, Brno, 21st October 2021 – ThreatMark, provider of the most advanced online fraud prevention solution in the market, has completed a new Read More 27 Oct 2021Cofense.News Cybersecurity First – It’s Everyone’s Job!Cybersecurity goes beyond October By Tonia Dudley Start the cybersecurity journey early with your employees or teammates. Work with your human Read More 26 Oct 2021Forcepoint.News Forcepoint Closes Acquisition of BitglassThat’s why I’m excited to announce today Forcepoint completed the acquisition of Security Service Edge (SSE) leader Bitglass. Bitglass helps Read More 26 Oct 2021BeyondTrust.Gartner.News Top 6 Overlooked Identity Security Problems | BeyondTrustTop 6 Overlooked Identity Security Problems | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time in a row. Read More 26 Oct 2021News.Qualys Vulnerability On-Demand Search Reporting & Easy Download optionsVulnerability reporting is different from any other aspect of a Vulnerability Management Program. The methodologies of Discover, Assess, Report Read More 25 Oct 2021Gartner.McAfee.News Realize Your SASE Vision with Security Service Edge and McAfee EnterpriseMany people are excited about Gartner’s Secure Access Service Edge (SASE) framework and the cloud-native convergence of networks and Read More 25 Oct 2021Micro Focus.News How does social responsibility relate to the Net Promoter® Score?Social responsibility is no longer a ‘niche’, instead it touches every industry around the world, including the software industry. It is Read More 24 Oct 2021News.Press releases.ThreatQuotient Interested in a Career in Cybersecurity? These Tips Can Help Guide Your JourneyInterested in a Career in Cybersecurity? These Tips Can Help Guide Your Journey KASEY ELLO With the current global cybersecurity talent shortage Read More 23 Oct 2021Forcepoint.News Product Spotlights: Network Security Session Coming October 26All of these elements have opened a Pandora’s box. A Robert Half survey found that 49% of employees prefer a hybrid work arrangement that Read More 23 Oct 2021News.Opentext Are your citizens paying a time tax?When was the last time you tried to get something done at your local, state or federal government agency? Did you look forward to it? Was it Read More 21 Oct 2021McAfee.News Is There Really Such a Thing as a Low-Paid Ransomware Operator?Lurking in the shadows of every large-scale attack by organized gangs of cybercriminals, however, there can be found a multitude of smaller Read More 20 Oct 2021Cofense.News Cybersecurity Career AwarenessWith the large gap in the cybersecurity workforce, it’s not surprising that the Cybersecurity and Infrastructure Security Agency (CISA) advocated Read More 19 Oct 2021BeyondTrust.Gartner.News Australian & New Zealand Government Reports Highlight the Value of PAM to Disrupt Cyber Attacks | BeyondTrustAustralian & New Zealand Government Reports Highlight the Value of PAM to Disrupt Cyber Attacks | BeyondTrust 2021 Gartner Magic Quadrant Read More 19 Oct 2021News.Qualys Apple fixes zero-day in iOS and iPadOS 15.0.2 emergency release: Detect and Prioritize Vulnerabilities using VMDR for Mobile DevicesApple recently released iOS and iPadOS 15.0.2 as an emergency security update that addresses 1 critical zero-day vulnerabilities, which is Read More 18 Oct 2021Gartner.McAfee.News China Personal Information Protection Law (PIPL): A New Take on GDPR?GDPR is a framework which requires businesses to implement processes to enable them to understand where data is held, how it is used, how long it Read More 18 Oct 2021News.Riverbed Visibility, Actionable Insights and Performance for the Modern, Hybrid Enterprise | RiverbedThis is an exciting week, as we host the Riverbed Global User Conference with thousands from both the Riverbed and Aternity user communities Read More 18 Oct 2021Micro Focus.News Software: Successfully Educated.I am Dr. James D. Borderick, and I look after the Competitive Benchmark research for Micro Focus, which I have been doing for over five years. I Read More 17 Oct 2021News.Press releases.ThreatQuotient.Webinars Curate and Share Threat Intelligence to Accelerate Security OperationsCurate and Share Threat Intelligence to Accelerate Security Operations MIKE SOLOMON AND ROSS HAMMER Over the last several months we’ve seen Read More 17 Oct 2021Indeed Identity.News Indeed PAM 2.6: modern response to potential threatsThe Indeed PAM software suite has been updated to Version 2.6. The release includes a lot of improvements and a number of new features that make Read More 16 Oct 2021Forcepoint.News To Cloud or Not to Cloud? The Case for a Hybrid InfrastructureBut, it’s not all good news. In the process of breaking barriers, security best practices were sometimes sacrificed. As with anything in the Read More 16 Oct 2021News.Opentext #BeCyberSmart: Detect forensically and respond rapidlyOctober is Cyber Awareness Month. To mark this I’m writing about a subject that is close to my heart, a subject I believe is our best Read More 14 Oct 2021McAfee.News 2021 Hispanic Heritage Month Pt. 5: A Celebration of Hispanic Heritage and HopeWhat do you enjoy most about your heritage and what is one of your favorite memories growing up? I love the food and music. To this day I Read More 13 Oct 2021Cofense.News Fight the Phish! Don’t Hesitate to report phishing!With phishing threats still the largest threat leading to a data breach, it’s not surprising that Department of Homeland Security (DHS) / Read More 12 Oct 2021BeyondTrust.Gartner.News ACSC Essential Eight | BeyondTrustACSC Essential Eight | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time in a row. Learn why! Dismiss Read More 12 Oct 2021News.Qualys From Technical Features to Customer Security MetricsQualys solutions are packed with great functionality to deliver operational efficiency to all our customers, but the value does not end with bits Read More 11 Oct 2021Ivanti.News 3Ps of Security: Protect, Prioritize and PatchLike a football or soccer team, security also has two lineups that must be continuously managed. One lineup involves protecting the digital Read More 11 Oct 2021McAfee.News Shaping the Future of CybersecurityI’m incredibly proud to be writing this as the newly appointed CEO of this combined business. Keeping nations and large enterprises safe is Read More 10 Oct 2021News.ThreatQuotient How Integration is Evolving: The X Factor in XDRXDR must be approached as an open architecture where integration is the linchpin Over the past couple of months, I’ve talked about how Read More 9 Oct 2021Forcepoint.Gartner.News Data Security Session Coming October 12As companies begin to open offices post-pandemic, Gartner sites 82% of organizations intend to permit remote working some of the time—even after Read More 9 Oct 2021News.Opentext How to increase billable hours and revenue for your law firmHow much time does the average person spend on their phone? Not surprisingly, a lot. People are spending an average screen time of 5.4 hours on Read More 7 Oct 2021McAfee.News Executive Spotlight: Q&A with Vice President, Global Commercial, Britt NorwoodQ: What’s the first career you dreamed of having as a kid? My first career was as a paper boy from 5th through 8th grade, but I always Read More 6 Oct 2021Cofense.News Be Cyber Smart: Four Steps to Protecting Your Business or HomeAs we kick of Cybersecurity Awareness Month, let’s start with a bit of background before digging into this week’s #BeCyberSmart theme. The Read More 5 Oct 2021Forcepoint.Gartner.News Value of SASE: Mitigate Threats to Data SecurityEnsuring that you can maintain control over such data, whether it’s a spreadsheet that has been downloaded to a laptop or a document stored in Read More 5 Oct 2021BeyondTrust.Gartner.News TrickBot Attack Chain: Deconstructed & Mitigated | BeyondTrustTrickBot Attack Chain: Deconstructed & Mitigated | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time Read More 5 Oct 2021News.Qualys QID Spotlight: Discover Azul Java VulnerabilitiesThe Qualys vulnerability signatures team has released a new series of signatures (detections) for Azul Java, allowing security teams to identify Read More 3 Oct 2021News.ThreatQuotient ThreatQuotient Publishes Research Report: State of Cyber Security Automation Adoption in 2021Report highlights trends and challenges of automating IT security systems and how CISOs and senior security professionals are planning to Read More 3 Oct 2021News.Riverbed Improved Alerting | NetIM Infrastructure Monitoring | RiverbedIf I had to pick one theme for the Riverbed NetIM infrastructure monitoring release (version 2.4), it would have to be new and improved alerting. Read More 2 Oct 2021Forcepoint.News Forcepoint Product Spotlights: Sessions to help secure your perimeter, secure your dataRegister for a Forcepoint Product Spotlight At Forcepoint, our goal is to arm our customers with technology that enables a hybrid workforce to be Read More 2 Oct 2021News.PROFITAP Profitap Showcases Network Monitoring Solutions at GITEX’21 in DubaiThe GITEX Technology Week (October 17-21, 2021, in Dubai, United Arab Emirates) is the biggest tech show in the Middle East, North Africa & Read More 2 Oct 2021News.Opentext National Day for Truth & ReconciliationReconciliation is not a noun. It is not an event. It’s a verb. – Roberta Jamieson Today we honor the lost children and Survivors of Read More 1 Oct 2021Indeed Identity.News Building Mindset for Privileged Account ManagementFor most companies PAM is something that is associated with creating borders or limitations. Often organizations are forced to implement PAM due Read More 1 Oct 2021Micro Focus.News Volunteering to Make Positive Impacts: My Volunteering StoryAs dozens of Micro Focus employees take time out to volunteer at their local foodbanks to support our charity partner Feeding America’s Hunger Read More 30 Sep 2021Gartner.McAfee.News The Art of Ruthless Prioritization and Why it Matters for SecOpsOne of the important goals of SecOps is a faster and more effective collaboration among all personnel involved with security. The team seeks to Read More 29 Sep 2021Cofense.News Three is the Magic NumberWhen it comes to prioritizing or recalling information, three is the magic number. Many of us know this thanks to Schoolhouse Rock with the Read More 28 Sep 2021BeyondTrust.Gartner.News Privileged Password Management in a Zero Trust Environment | BeyondTrustPrivileged Password Management in a Zero Trust Environment | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third Read More 28 Sep 2021News.Qualys Prioritize Remediation with a Perceived-Risk Approach to Strengthen CyberSecurity EffectivenessMinimizing Time To Remediate (TTR) is becoming one of the key metrics of security program effectiveness. This holistic measure represents many Read More 27 Sep 2021McAfee.News Detecting Credential Stealing Attacks Through Active In-Network DefensePost initial compromise, to be able to execute meaningful attacks, attackers would need to steal credentials to move laterally inside the Read More 26 Sep 2021News.Press releases.ThreatQuotient ThreatQuotient Continues Tradition of Celebrating World Rhino Day in 2021Rhino conservation efforts remain an important mission for the Reston, Va. based cybersecurity company Reston, Va. – Sept. 22, 2021 – Read More 25 Sep 2021Forcepoint.News How Two Fortune 150 Companies Save Millions With ForcepointApart from the obvious advantages of protecting the brand’s reputation and avoiding financial penalties by defending against security threats, Read More 25 Sep 2021News.Opentext Enabling highly personalized content at scale with customer dataFor content marketers, finding out that the campaign you worked so hard on didn’t hit the spot is incredibly frustrating. It’s even Read More 24 Sep 2021Micro Focus.News “Staying Current” is Not Just a Fashion StatementKeeping up with the latest fashion trends can be an uncomfortable and costly exercise. Having mistakenly perceived the wisdom of flared trousers, Read More 23 Sep 2021McAfee.News McAfee Enterprise Defender Blog | OMIGOD Vulnerability Opening the Door to Mirai BotnetThis month Microsoft released patches for 86 vulnerabilities. While many of these vulnerabilities are important and should be patched as soon as Read More 22 Sep 2021Cofense.News Phishing as a Ransomware PrecursorFor what seems like years now, ransomware has captured headlines due to its sensationally disruptive and costly nature. And over these years, Read More 21 Sep 2021BeyondTrust.Gartner.News Remote Access Control Strategies for the Work-from-Anywhere (WFA) Era | BeyondTrustRemote Access Control Strategies for the Work-from-Anywhere (WFA) Era | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader Read More 21 Sep 2021News.Qualys Improving Cybersecurity Practices by Managing the Asset LifecycleSecuring enterprise environments continues to increase in importance. Attacks on infrastructure continue to increase and organizations need to Read More 20 Sep 2021McAfee.News The Bug Report | September 2021: CVE-2021-40444There’s a lot of information out there on critical vulnerabilities; this short bug report contains an overview of what we believe to be the Read More 19 Sep 2021Gartner.News.ThreatQuotient How Threat Response is EvolvingAs adversaries changed their view of an attack to include vectors across an organization, defenders have had to evolve their approach as well. Read More 18 Sep 2021Forcepoint.News Value of SASE: Secure Data in the CloudTo mitigate this risk, many businesses and government agencies began shifting to cloud-based security to replace the on-premises solutions. In Read More 18 Sep 2021News.Opentext Innovating with your customersFrom healthcare to supply chains to cyber security, the global pandemic has fundamentally changed how we live and work. Although digital Read More 16 Sep 2021McAfee.News Executive Spotlight: Q&A with SVP of Global Channels, Kathleen CurryQ: Who has been the most influential person in your life? My father instilled in me, from as far back as I can remember, that I can do whatever I Read More 14 Sep 2021Forcepoint.News Network Security: The Invisible DefenderThe shift to remote work and the increasing complexity of the technology landscape – with most organizations now running hybrid infrastructures Read More 14 Sep 2021BeyondTrust.Gartner.News How Well do Windows 10 Security Features Protect against Ransomware? | BeyondTrustHow Well do Windows 10 Security Features Protect against Ransomware? | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for Read More 13 Sep 2021McAfee.News How to Talk to Your Grandparents About CybersecurityWith Grandparent’s Day right around the corner, here’s a guide on how you can help keep your grandparents safe from the Read More 12 Sep 2021News.Press releases.ThreatQuotient Leveraging MISP and TheHive When You Create Your CTI PracticeLeveraging MISP and TheHive When You Create Your CTI Practice CYRILLE BADEAU Many CISOs I speak with across Europe tell me their cybersecurity Read More 12 Sep 2021News.Versasec Our newest hires expand our R&D and Tech Support groupsDate: 2021-09-10Author: Yvonne Moebius, Human Resources Previous << vSECCMS61 Changing Credential Template on Already Issued Credentials Read More 11 Sep 2021Forcepoint.News The Digital Journey for Our Customers and Partners Just Got BetterHere’s what you told us: I’m excited to share enhancements made to our Forcepoint Customer Hub that directly resulted from our community’s input. Read More 11 Sep 2021Ivanti.News Fighting Ransomware: Using Ivanti’s Platform to Build a Resilient Zero Trust Security Defense – Part 2Within the initial blog in this series, we discussed ransomware attacks and their remediation on Android mobile devices. Part 2 addresses Read More 11 Sep 2021News.Opentext Three MDR strategies for government CISOs to quickly detect and respond to threatsThe US President’s Cybersecurity Executive Order, released in May 2021, outlines “the persistent and increasingly sophisticated Read More 9 Sep 2021McAfee.News Executive Spotlight: Q&A with Chief Public Policy Officer, Tom GannQ: What is one event in your life that made you who you are today? Teaching tennis. I know that teaching tennis is not an event, it’s a Read More 7 Sep 2021BeyondTrust.Gartner.News BeyondTrust Celebrates “Summer of Pride”, Culminating with BeyondDiversity 2021 Summit | BeyondTrustBeyondTrust Celebrates “Summer of Pride”, Culminating with BeyondDiversity 2021 Summit | BeyondTrust 2021 Gartner Magic Quadrant names Read More 6 Sep 2021McAfee.News Executive Spotlight: Q&A with EMEA Senior Vice President, Adam PhilpottQ: Do you have a role model? If so, who is it? Well, there are work and there are more personal role models. At work, I have several past and Read More 5 Sep 2021News.Press releases.ThreatQuotient Learn Why Frost & Sullivan Names ThreatQuotient the XDR Competitive Strategy LeaderLearn Why Frost & Sullivan Names ThreatQuotient the XDR Competitive Strategy Leader MARC SOLOMON Extended Detection and Response (XDR) is the Read More 5 Sep 2021News.Versasec Adolfsson Named Global Product Manager for vSEC:CMSDate: 2021-09-02Author: Yvonne Moebius, Human Resources Previous << PKI Cybersecurity on rise in ASEAN During his nearly five years with Read More 4 Sep 2021News.Opentext AWS for Health and OpenText for Healthcare – Better togetherEarlier this month Amazon Web Services introduced AWS for Health, an offering of curated AWS services and AWS Partner Network solutions used by Read More 3 Sep 2021Micro Focus.News Ensure Customers Receive Return on their Software Investment by being Socially ResponsibleIn our recent work, we have demonstrated the importance of social responsibility and environmentalism for business and have shown how brands are Read More 2 Sep 2021News.PROFITAP Network blind spots: TAPs vs SPAN portsNetwork blind spots could be compared to a slow gas leak. They are hidden areas of the network that negatively impact the network’s Read More 2 Sep 2021Gartner.McAfee.News.Webinars SASE, Cloud Threats and MITREAs a quick refresher, the MITRE Att&CK Matrix represents the relationship between attacker Tactics and Techniques: As you know, McAfee Read More 1 Sep 2021Cofense.News Mobile Messaging Service Abused for PhishingUsing Cofense Vision, analysts at the Cofense Phishing Defense Center (PDC) were able to drill down into the targeting patterns of one phishing Read More 31 Aug 2021Forcepoint.Gartner.News.Webinars Value of SASE: Separating Product from PhilosophySASE isn’t a single product; it’s an architecture or philosophy, according to Gartner analyst Nat Smith. Many vendors now offer bundled solutions Read More 31 Aug 2021BeyondTrust.Gartner.News Good User Experience Leads to Good Security | BeyondTrustGood User Experience Leads to Good Security | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time in a row. Read More 29 Aug 2021Gartner.News.ThreatQuotient How Threat Detection is EvolvingAs adversaries have shifted the focus of attacks to achieve their goals, defenders must evolve their approach to threat detection The threat Read More 29 Aug 2021News.Versasec User Self-Service with vSEC:CMS is Easier than EverDate: 2021-08-24Author: Joerg Dettmann, CTO Previous << Cybercrime is global and so is MFA With every new version of our flagship identity Read More 28 Aug 2021News.Opentext What’s new in OpenText Gupta SQLBase 12.3OpenText™ Gupta SQLBase 12.3 increases access security, provides the tools to comply with data protection regulations like GDPR. The query Read More 26 Aug 2021McAfee.News McAfee Enterprise ATR Uncovers Vulnerabilities in Globally Used B. Braun Infusion PumpCVE-2021-33886 – Use of Externally-Controlled Format String (CVSS 7.7) CVE-2021-33885 – Insufficient Verification of Data Read More 24 Aug 2021News.Titus Why India has Introduced the New Personal Data Protection BillHome » Titus Blog » Why India has Introduced the New Personal Data Protection Bill Maheswaran Shanmugasundaram · Friday, August 20th, Read More 24 Aug 2021BeyondTrust.Gartner.News.Webinars DevOps Security Lessons | BeyondTrustDevOps Security Lessons | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time in a row. Learn why! Dismiss Read More 22 Aug 2021News.Press releases.ThreatQuotient Defence Engineering and Threat Intel – No Stone Left UnturnedDefence Engineering and Threat Intel – No Stone Left Unturned ANTHONY STITT Every breach starts as a compromise that goes unnoticed and Read More 22 Aug 2021News.Versasec Multi-factor authentication is the easiest way to prevent breachesDate: 2021-08-17Author: Chin Jien Lau, Technical Consultant Previous << Hardware Based PKI Webinar The biggest headline-grabbing Read More 21 Aug 2021Forcepoint.News.Webinars SASE’s Role in Retail and HospitalityThat’s where Secure Access Service Edge (SASE) architecture comes in. How can highly distributed organizations, especially ones in which 24/7 Read More 21 Aug 2021News.Opentext.Press releases Learn all about developer services in 15 minutesDevelopers can find it hard to gain insightful and practical knowledge about developer services. Reading lengthy, business-oriented documentation Read More 20 Aug 2021Micro Focus.News Micro Focus Supports Canada’s First Sustainable IT PledgeThe importance of us all taking action to protect the environment has never been greater, which is why Micro Focus is proud to sign the CIO Read More 19 Aug 2021cPacket Networks.News August 2021 NewsletterThe post August 2021 Newsletter appeared first on cPacket Networks.Read More 18 Aug 2021News.Riverbed Supply Chain Attacks | Identify Indicators of compromise | RiverbedConsider a soft drinks manufacturer. If a competitor wanted to damage its market shares, rather than targeting the bottling plant, it would be Read More 17 Aug 2021BeyondTrust.Gartner.News What is System for Cross-domain Identity Management (SCIM) & What are the Benefits? | BeyondTrustWhat is System for Cross-domain Identity Management (SCIM) & What are the Benefits? | BeyondTrust 2021 Gartner Magic Quadrant names Read More 17 Aug 2021News.Qualys Google Android August 2021 Security Patch Vulnerabilities: Discover and Take Remote Response Action Using VMDR for Mobile DevicesThe recently released Android Security Bulletin for August 2021 addresses 36 vulnerabilities, out of which 5 are rated as critical Read More 15 Aug 2021Gartner.News.Press releases.ThreatQuotient Are You Prepared to Better Protect Against SANS’ Top Attacks and Threats?Are You Prepared to Better Protect Against SANS’ Top Attacks and Threats? ANDY GEPERT The SANS 2021 Top New Attacks and Threat Report is Read More 15 Aug 2021News.Versasec Hardware-based PKI is on the rise in ASEAN: Learn whyCompany Blog Our blog addresses the latest security trends and stories. The posts discuss how identity and access management are playing a larger Read More 14 Aug 2021Forcepoint.News “Tiny Crimes” – the WFH behaviors that invite cyber risk (Australian Survey)Here’s a condensed version of the conversation: Dr Margaret Cunningham, Principal Research Scientist at Forcepoint, and Nick Savvides, Read More 14 Aug 2021News.Opentext Get business content management up and running fast with no IT supportThorsten Fischer leads the Product Management team responsible for the OpenText next-generation SaaS content services Read More 12 Aug 2021McAfee.News Data Centric Zero Trust for Federal Government CybersecurityWhereas the DoD architecture establishes control planes that each have their own decision point, with data given its own decision point, NIST Read More 11 Aug 2021Ivanti.News August Patch Tuesday 2021August Patch Tuesday is much lighter than the past few months. A total of 44 vulnerabilities were resolved by Microsoft, seven of which are rated Read More 10 Aug 2021Forcepoint.News Bringing Government-Strength Data Protection to a Commercial Operational EnvironmentYou can read more about cross-domain solutions and Forcepoint Data Guard in part one of our blog series. However, in today’s integrated digital Read More 10 Aug 2021BeyondTrust.News KuppingerCole Executive Review of Endpoint Privilege Management & the BeyondTrust Solution | BeyondTrustRisks of Digital Transformation The coronavirus pandemic sparked a renewed push for digital transformation, so organizations could adapt, become Read More 10 Aug 2021News.Qualys Tenacity – An Adversary Emulation Tool for PersistencePersistence is one of the more sought-after techniques of an attacker or adversary. Persistence is achieved through a set of tactics or Read More 9 Aug 2021McAfee.News White House Executive Order – Improving Detection of Cybersecurity VulnerabilitiesBetween the initial publication of the Executive Order (EO) for Improving the Nation’s Cybersecurity on May 12 and late July, a flurry of Read More 9 Aug 2021Micro Focus.News Why is Software Education so Important?Education. This is not normally a touchpoint along the customer journey that most people think of when describing the main interaction points Read More 8 Aug 2021News.ThreatQuotient Security is a Big Data Problem, and It’s Getting BiggerSolving security’s big data problem is about prioritized data flow, continuously processing data for analysis and translating and exporting Read More 8 Aug 2021News.Versasec PKI & MFA: What you need to knowDate: 2021-08-02Author: Carolina Martinez, GM Americas Previous << MFA Welcome to the second installment in our Summer Series of video Read More 7 Aug 2021Forcepoint.News New Approaches for ‘Air Gapped’ IT and OT Environments for Critical InfrastructureIn this new world of interconnected systems, critical infrastructure organizations benefit from a multitude of Internet of Things devices with Read More 7 Aug 2021News.Opentext OpenText’s 2021 Corporate Citizenship ReportThese past 18 months have made it clear that companies have an opportunity to create positive change, not just for employees and customers, but Read More 5 Aug 2021McAfee.News New Company, Same Commitment: Channel FirstAs we start this chapter as a pure-play enterprise security company, my focus is on adding value for our partners at all levels, ensuring our Read More 3 Aug 2021News.Titus Enterprise Data Classification: Why you need best-of-breed data classificationHome » Titus Blog » Enterprise Data Classification: Why you need best-of-breed data classification Georgina Stockley · Wednesday, July Read More 3 Aug 2021Forcepoint.News Transforming the Science of Security with Human FactorsMy colleague Dr. Calvin Nobles, department chair and associate professor of information and management at the Illinois Tech College of Computing, Read More 3 Aug 2021BeyondTrust.Gartner.News The Seven Perils of Privilege: How Exactly Can You Avoid Them? | BeyondTrust The Seven Perils of Privilege: How Exactly Can You Avoid Them? | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the Read More 3 Aug 2021News.Qualys Qualys Research Nominated for Pwnie Awards 2021The Qualys Research team has been nominated for five Pwnie Awards this year in three different categories. In addition to nominations for Best Read More 2 Aug 2021News.PROFITAP Introducing XX-12800G Network Packet BrokerProfitap recently announced the release of XX-12800G, the new high-density Network Packet Broker, bringing the power and flexibility of network Read More 2 Aug 2021McAfee.News Introducing MVISION Cloud Firewall – Delivering Protection Across All Ports and ProtocolsWherever networks went, firewalls followed For a long time, firewalls and computer networks were like conjoined twins. Businesses simply could Read More 1 Aug 2021Gartner.News.Press releases.ThreatQuotient How to Assess and Up-level Your Organization’s Maturity for SOAR, Gartner’s TakeHow to Assess and Up-level Your Organization’s Maturity for SOAR, Gartner’s Take MARC SOLOMON Earlier this year, Gartner published Read More 1 Aug 2021News.Versasec Passwords Do NOT Cut it: Why MFA is Critical TodayDate: 2021-07-28Author: Carolina Martinez, GM Americas Previous << Versasec Registers With FSQS NL It’s time for summer school Read More 31 Jul 2021Forcepoint.News Forcepoint NGFW MITRE ATT&CK simulationIn this scenario, an admin researches an issue, finds a potential solution on a forum. The solution provides a download link to PuTTY. Read More 31 Jul 2021Indeed Identity.News Indeed PAM 2.5: user experience is a key to resilient cybersecurityIndeed Identity presents a new version of Indeed Privileged Access Manager. Indeed PAM 2.5 offers enhanced access policy mechanisms, new features Read More 31 Jul 2021News.Opentext What’s new in OpenText Internet of Things PlatformThe latest announcement by OpenText of Cloud Editions includes some great updates to OpenText Internet of Things Platform. Check out the latest Read More 28 Jul 2021Cofense.News Reporting Matters – even for a Smishing MessageWith the increased use of mobile devices to manage so much of our lives, it’s no surprise scammers have moved to this medium to target your Read More 27 Jul 2021News.ThreatMark ThreatMark recognized as a Representative Vendor in 2021 Gartner Market Guide for Online Fraud DetectionWe are excited to announce that ThreatMark, a developer and provider of advanced fraud prevention solutions, was listed as a Representative Read More 27 Jul 2021Forcepoint.News EO 14028 is “right on time,” but challenges remain in race to develop softwareThe Cybersecurity Executive Order dictated publishing guidance outlining security measures for critical software, on Day 60 (see highlighted Read More 27 Jul 2021BeyondTrust.Gartner.News Should Your Organization Consolidate Its Service Desk Tools? | BeyondTrustShould Your Organization Consolidate Its Service Desk Tools? | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the Read More 27 Jul 2021News.Qualys Protect your Devices from Pegasus Spyware using VMDR for Mobile Devices’ Proactive ApproachPegasus spyware is in the news, and it has been used to target devices of critical people from different sectors and countries including Read More 25 Jul 2021Gartner.News.Press releases.ThreatQuotient Are You Prepared for the Surge in Ransomware?Are You Prepared for the Surge in Ransomware? ANTHONY STITT Incidents of ransomware have been increasing and evolving steadily for years as Read More 25 Jul 2021News.Versasec vSEC:CMS S6.1 announced by Joerg Dettmann, Versasec Founder and CTODate: 2021-07-21Author: Jörg Dettmann, Founder and CTO Previous << FIDO It’s a big week for our technical team and the entire company as we Read More 24 Jul 2021Forcepoint.News Can Cybersecurity Be Robust Without Being Rigid?Decisions around cybersecurity can be stressful, if not plain scary. The stakes are always high, and it seems like there’s a headline related to Read More 24 Jul 2021News.Opentext Using first-party data to deliver personalized and tailored digital experiences at scaleDelivering personalized digital experiences is getting harder even as the technology to do so gets better. As the value of third-party data is Read More 21 Jul 2021Cofense.News Cofense Delivers Industry’s First Cloud-Native Email Security for Microsoft 365 and Google Workspace – Deployable in Less than a MinuteCofense Protect MSP pairs Computer Vision (a field of artificial intelligence) that simulates how humans see, with Cofense PhishMe’s real-world Read More 20 Jul 2021News.Titus U.S. Data Privacy Gains MomentumAdam Strange · Wednesday, July 14th, 2021 As more and more social and economic activities move online, the importance of privacy and data Read More 20 Jul 2021Forcepoint.News.Webinars Boards of Directors: Cyber Risk is the Cost of Doing BusinessPrinciples for Board Governance of Cyber Risk (Report) And this absolutely raises the stakes for Boards of Directors and the critical role they Read More 20 Jul 2021BeyondTrust.News Endpoint Security vs. Network Security – Revisited | BeyondTrustEndpoint Security vs. Network Security – Revisited | BeyondTrust July 19, 2021 Open You May Also Be Interested In: Our website uses cookies Read More 20 Jul 2021News.Qualys Google Android July 2021 Security Patch Vulnerabilities: Discover and Take Remote Response Action Using VMDR for Mobile DevicesThe recently released Android Security Bulletin for July 2021 addresses 44 vulnerabilities, out of which 7 are rated as critical vulnerabilities. Read More 19 Jul 2021cPacket Networks.News cPacket Networks Accelerates Growth with New Headquarters, Expands Facilities and Its Global FootprintThe post cPacket Networks Accelerates Growth with New Headquarters, Expands Facilities and Its Global Footprint appeared first on cPacket Networks.Read More 19 Jul 2021McAfee.News White House Executive Order – Removing Barriers to Sharing Threat InformationElimination of contractual barriers that limit sharing across agencies through FAR modifications The expansion of log retention Mandatory Read More 18 Jul 2021Gartner.News.ThreatQuotient Three Approaches to an XDR ArchitectureExtended Detection and Response (XDR) can be confusing based on so many different definitions and approaches In 2020, Extended Detection and Read More 18 Jul 2021News.Versasec Versasec Joins FIDO AllianceDate: 2021-07-13Author: Jörg Dettmann, CTO Previous << Cybersecurity Denial and Cure This week, we announced we’re now members of the FIDO Read More 17 Jul 2021Forcepoint.News Forcepoint’s Deep Secure Acquisition Shapes the Future of Malware Protection within Cross Domain Solutions and Data-first SASECDR protects enterprises by deconstructing and disarming commonly used files, including MS Office, PDFs , images, etc, and rebuilding them to Read More 17 Jul 2021Indeed Identity.News Video: “PAM is a key driver to have a compliant and secure environment”The growing importance of implementing privileged access management at the corporate level is noted by leading cybersecurity analytics. They Read More 17 Jul 2021News.Opentext Why 91% of enterprises are looking for new integration solutionsEarlier this year, OpenText and IDG surveyed enterprises with more than 1,000 employees on ERP integration, including insights on their current Read More 14 Jul 2021Cofense.News The Difference Between an Attempted Attack and a Widespread Ransomware Attack is Employee ReportingThe recent Kaseya attack, in which threat actors leveraged a zero-day vulnerability over the holiday weekend, demonstrates that ransomware is Read More 13 Jul 2021News.Titus Heads up! New Canadian Data Privacy Act is Around the CornerThe time to prepare to meet soon-to-be-enacted Canadian data privacy regulations is now. Around the world, the awareness of the need to protect Read More 13 Jul 2021Forcepoint.Gartner.News Transforming from “Zero” to “Hero” with Data-first SASEMany organizations are replacing the short-term workarounds implemented during the pandemic to keep people safe, yet productive. Today, Read More 13 Jul 2021BeyondTrust.News BeyondTrust Introduces ServiceNow Integration with Privilege Management for Windows & Mac | BeyondTrustBeyondTrust Introduces ServiceNow Integration with Privilege Management for Windows & Mac | BeyondTrust July 7, 2021 Open You May Also Be Read More 13 Jul 2021News.Qualys Qualys API Best Practices: Host List Detection APIHost List Detection is your subscription’s list of hosts and their corresponding up-to-date detections including: Confirmed Vulnerability Read More 12 Jul 2021McAfee.News Adding Security to Smartsheet with McAfee CASB ConnectIn June 2021, McAfee MVISION Cloud released support for Smartsheet – providing cornerstone CASB services to Smartsheet through the CASB Read More 11 Jul 2021News.Press releases.ThreatQuotient.Webinars 5 Tips to Improve Threat Report Analysis and Action5 Tips to Improve Threat Report Analysis and Action LIZ BUSH Most organizations have more threat intelligence than they know what to do with, Read More 11 Jul 2021News.Versasec Cybersecurity Denial and its Common Sense CureCompany Blog Our blog addresses the latest security trends and stories. The posts discuss how identity and access management are playing a larger Read More 11 Jul 2021Ivanti.News Apple WWDC 2021Apple’s Worldwide Developers Conference is a week of amazing sessions that define the coming year, announce new features, and preview Read More 10 Jul 2021News.Opentext Why effective asset visibility starts at the digital twinThe cost of poor asset visibility is potentially enormous. Estimates suggest companies are losing almost $25 billion each year in the UK alone. Read More 8 Jul 2021Gartner.McAfee.News The Industry Applauds MVISION XDR – Turning Raves into BenefitsExtended Detection and Response products, better known as XDR, not only extended the capabilities of EDR platforms, but according to Gartner[1] Read More 6 Jul 2021BeyondTrust.News Privileged Access Management for DevOps – BeyondTrust Stands out as a Leader in KuppingerCole Report | BeyondTrustPrivileged Access Management for DevOps – BeyondTrust Stands out as a Leader in KuppingerCole Report | BeyondTrust June 30, 2021 Open You May Read More 4 Jul 2021News.ThreatQuotient How to infuse agility into security operationsFor many years, security professionals have talked about the OODA loop. Devised by Colonel John Boyd, it describes a decision-making cycle that Read More 3 Jul 2021Forcepoint.News Forcepoint CASB Helps Global Customers Safely Adapt to Hybrid Workplace ChangesCompanies are increasingly turning to cloud services to ensure their employees have access to important business data and resources from anywhere Read More 3 Jul 2021Forcepoint.News Forcepoint CASB Helps Global Customers Safely Adapt to Hybrid Workplace ChangesCompanies are increasingly turning to cloud services to ensure their employees have access to important business data and resources from anywhere Read More 3 Jul 2021News.Opentext OpenText employee wins The Outstanding Workers of the Republic Awards (TOWER)We are excited to announce that one of our employees, Nell D. Pagkalinawan, Principal Cloud Applications Consultant, has been recognized as one Read More 3 Jul 2021News.Riverbed SSL Certificate Management Made Simple, Secure, and at Scale | RiverbedSSL and TLS traffic are among the most common forms of secure network traffic in today’s enterprise. The Riverbed Application Acceleration Read More 2 Jul 2021News.PROFITAP Timestamp analysis: why you need it and 3 efficient ways to run itA crucial aspect of running and maintaining a network is achieving optimal performance. In the context of network monitoring, performance can be Read More 2 Jul 2021Micro Focus.News How does social responsibility relate to customer trust?Introduction Social responsibility is no longer a ‘niche’, instead it touches every industry around the world, including the software industry. Read More 1 Jul 2021McAfee.News.Webinars How to Proactively Increase Your Protection Against Ransomware with Threat IntelligenceWhich Ransomware campaigns and threat profiles are most likely going to hit you? MVISION Insights provides near real time statistics on the Read More 1 Jul 2021Allied Telesis.News Intelligent Asset Management: Riding the Wave of Predictive MaintenanceMaintenance and Repair Operations (MRO) are among the most important activities of modern industrial organizations. They enable enterprises to Read More 29 Jun 2021Forcepoint.News Spend now, pay later? Settling the score of technical debtTechnical debt is a complex concept, going back decades, and relatively simple misconfigurations like Fastly’s are just a very visible example of Read More 29 Jun 2021BeyondTrust.News.Webinars Taking PAM Back to the Basics: Privileged Password Management | BeyondTrustTaking PAM Back to the Basics: Privileged Password Management | BeyondTrust June 28, 2021 Open You May Also Be Interested In: Our website uses Read More 27 Jun 2021News.ThreatQuotient XDR is a Destination, Not a SolutionIf we define XDR as a solution, SOCs can’t reach their ultimate destination because, as a solution, XDR can’t be a holistic approach Read More 27 Jun 2021News.Versasec Another Perk of MFA: Lowered Insurance PremiumsDate: 2021-06-24Author: Carolina Martinez, General Manager Americas Previous << Governments Working Hard To Better Protect User Identities Read More 26 Jun 2021News.Opentext.Press releases What’s new in OpenText AxcelerateThe latest announcement by OpenText of Cloud Editions includes some great updates to OpenText™ Axcelerate™. Check out the latest Read More 25 Jun 2021Micro Focus.News Micro Focus Consulting. Professional. Service.I am Dr. James D. Borderick, and I look after the Competitive Benchmark research for Micro Focus, which I have been doing for over five years. I Read More 24 Jun 202124 Jun 2021Siemplify.Vendors REAL security to distribute Siemplify to serve the Southeast European region’s need for SOAR platformA distribution agreement has been concluded between Israel-headquartered Siemplify, the #1 Independent SOAR Platform, and Slovenia-based REAL Read More 24 Jun 2021Gartner.McAfee.News Transforming to a Predictive Cyber DefenseIf you’re like me, working from a home office, you can’t help but think about all of the cybersecurity tradeoffs that accompanied the Read More 23 Jun 2021Cofense.News It’s Not Safe: “Security Update” Goes Phishing via PDFFigure 1: Email Body The Cofense Phishing Defense Center (PDC) has observed a phishing campaign that aims to harvest Office365 (O365) Read More 22 Jun 2021News.Titus Data Classification Best PracticesAdam Strange · Monday, June 21st, 2021 Data classification tools not only help organizations to protect their data, they also help users Read More 22 Jun 2021Forcepoint.News Securing the Workforce of the Future – ForcepointFujitsu’s Head of Strategy and Growth, Workforce and Workspace Services, Andy Davis joined Forcepoint to discuss the changes and measures Read More 22 Jun 2021BeyondTrust.News IDSA Study Shows IT Leaders Embracing Identity-Centric Security to Close Remote Work & DX Gaps | BeyondTrustIDSA Study Shows IT Leaders Embracing Identity-Centric Security to Close Remote Work & DX Gaps | BeyondTrust June 18, 2021 Open You May Also Read More 21 Jun 2021McAfee.News Testing to Ensure Your Security Posture Never SlouchesTake, for example, the May 7th DarkSide ransomware attack that shut down Colonial Pipeline’s distribution network. That well-publicized Read More 20 Jun 2021News.ThreatQuotient ThreatQuotient Recognized as Best Security Investigation Platform by 2021 CDM Global Infosec AwardsRecent Award Wins Highlight Innovative Threat Intelligence and Security Investigation Capabilities, Women in Cybersecurity Leadership Reston, Va. Read More 20 Jun 2021News.Versasec As PKI Requirements in Government Agencies Grow, Versasec is there to HelpDate: 2021-06-17Author: Carolina Martinez, General Manager Americas Previous << MFA Could Have Prevented Pipeline Attack Better protecting Read More 19 Jun 2021Forcepoint.News 5 Steps to SASE: Connecting and Protecting Branch OfficesSo far in our #5steps2sase series, we’ve focused a lot on enabling individual users to safely connect to resources and use data obtained from Read More 19 Jun 2021News.Opentext How to handle chat data in eDiscovery and investigationsWater-cooler talk and quick chats in the office disappeared with the pandemic. But online chat—already a prevalent form of communication Read More 18 Jun 2021News.Riverbed Agentless Monitoring Solution for AWS VPC Traffic | AppResponse Cloud | RiverbedWe are in a time where companies already accept the importance of cloud-driven transformation, but gaining insights across cloud services, Read More 17 Jun 2021Gartner.McAfee.News McAfee Named a 2021 Gartner Peer Insights Customers’ Choice for SWGIn its announcement, Gartner explains, “The Gartner Peer Insights Customers’ Choice is a recognition of vendors in this market by Read More 16 Jun 2021Cofense.News Domain Doppelgangers: Your Good Name as Phishing Bait? Cofense, Confense. Big deal, right? Wrong. Here’s why. Does your company have an evil twin on the web? Threat actors may be leveraging Read More 15 Jun 2021Forcepoint.News New Research – Are headlines hype or are U.S. federal cybersecurity threats growing?In the latest Ponemon Institute research, “Cybersecurity Risks in the Federal Government,” sponsored by Forcepoint, Ponemon took a deeper Read More 15 Jun 2021BeyondTrust.News Defining & Protecting Critical Software to Improve U.S. Cybersecurity & Supply Chain Resilience | BeyondTrustDefining & Protecting Critical Software to Improve U.S. Cybersecurity & Supply Chain Resilience | BeyondTrust June 10, 2021 Open You May Read More 15 Jun 2021News.Qualys DarkSide RansomwareDarkSide ransomware is a relatively new ransomware strain that threat actors have been using to target multiple large, high-revenue organizations Read More 14 Jun 2021McAfee.News The Executive Order – Improving the Nation’s Cyber SecurityIt is clear from the EO that the Executive Office of the President is putting significant emphasis on cyber threat intelligence and how it will Read More 13 Jun 2021News.Press releases.ThreatQuotient Employee Spotlight – David StrombergEmployee Spotlight PROFILE – DAVID STROMBERG David Stromberg – Talent Acquisition Manager What was your first or the Read More 13 Jun 2021News.Versasec VPN Failure that Led to Colonial Pipeline Breach was Preventable with MFADate: 2021-06-10Author: Anders Adolfsson, Product Manager Previous << ACME support now available in vSECCMS When the Colonial Pipeline was Read More 12 Jun 2021News.Opentext Why you need a top digital experience platform in 2021The COVID-19 pandemic has accelerated a social and technology trend that has been happening for some time. The way we live our lives and conduct Read More 11 Jun 2021Ivanti.News Wall Street Journal Predicts Dire Cybersecurity Days Ahead, Endorses Zero TrustLet’s be honest for a second. This is a corporate blog. Yes, we aim to provide our readers with actionable, educational information. And, yes, Read More 11 Jun 2021Micro Focus.News Carbon Friendly IT – Saving Costs, Increasing Efficiencies and Protecting the PlanetTechnology can play a key role in helping to reduce an organization’s environmental impact. At Micro Focus, our aim is to make sustainable and Read More 8 Jun 2021News.Titus Key Takeaways from Biden’s Sweeping Executive Order on CybersecurityHome » Titus Blog » Key Takeaways from Biden’s Sweeping Executive Order on Cybersecurity Georgina Stockley Adam Strange · Friday, June Read More 8 Jun 2021BeyondTrust.News How to Penetration Test (Pentest) Remote Worker Endpoints: What’s in Scope, & What’s Off Limits | BeyondTrustHow to Penetration Test (Pentest) Remote Worker Endpoints: What’s in Scope, & What’s Off Limits | BeyondTrust June 1, 2021 Open You May Also Read More 6 Jun 2021News.ThreatQuotient Is Your Adversary James Bond or Mr. Bean?Especially with nation-state attacks, it’s critical to assess whether you’re up against jet fighter strength or a bumbler who tries Read More 6 Jun 2021News.Versasec evolutionID users can now enjoy PKI securityDate: 2021-06-01Author: Will Houry, VP of Sales Previous << HW PKI BrightTALK Today we announced our partnership with evolutionID. The Read More 5 Jun 2021Forcepoint.News 5 Steps to SASE: Safeguarding the Usage of Data EverywhereIn our first two episodes about the 5 Steps to SASE, we discussed the most common ways organizations begin using SASE: protecting access to the Read More 5 Jun 2021News.Opentext RIG Exploit Kits exploit Internet Explorer delivering Dridex TrojanThe RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser and Read More 4 Jun 2021Micro Focus.News Our Ambition to Inspire a Million LivesAt Micro Focus, we believe in the strength of collaboration and teaming to achieve positive impacts and meaningful outcomes. It’s this purpose Read More 3 Jun 2021cPacket Networks.News cPacket Networks Extends Industry-Leading Ultra-Low-Latency Monitoring and Brokering Solution for 100Gbps Network ObservabilityThe post cPacket Networks Extends Industry-Leading Ultra-Low-Latency Monitoring and Brokering Solution for 100Gbps Network Observability appeared Read More 3 Jun 2021McAfee.News Why May 2021 Represents a New Chapter in the “Book of Cybersecurity Secrets”If the situation sounds ominous, it is. The words and guidance outlined in the DoDZTRA and EO must be followed up with a clear path to action and Read More 3 Jun 2021News.Riverbed Transformative Technology | Business and Economic Impact of Digitization | RiverbedAccording to the Harvard Business Review, only 23% of companies are non-digital with few, if any products or operations that depend on digital Read More 2 Jun 2021News.PROFITAP New Video: IOTA API ConfigurationJohn Modlin, Systems Engineer from Profitap, shows in this video an overview of API configuration on IOTA.Read More 2 Jun 20212 Jun 2021Group-IB.News.RISK conference.Webinars GROUP-IB DIGITAL RISK SUMMIT 2021Join Group-IB Digital Risk Summit to hear about the latest global trends from industry experts, dive deep into new technologies, get insights Read More 1 Jun 2021News.Titus Top Data Security Challenges and How to Address ThemHelpSystems Webmaster · Tuesday, May 25th, 2021 Addressing an organization’s data security challenges requires some heavy lifting – no Read More 1 Jun 2021BeyondTrust.News SCADA and IoT Security: What is Broken, & Can it Be Fixed? | BeyondTrustSCADA and IoT Security: What is Broken, & Can it Be Fixed? | BeyondTrust May 28, 2021 Open You May Also Be Interested In: Our website uses Read More 1 Jun 2021News.Qualys Monitor Windows Registry Changes with Qualys File Integrity MonitoringWith Windows registries storing a large number of programs and OS security settings and a large amount of raw data, threat actors have begun to Read More 31 May 2021McAfee.News Happy Birthday GDPR!Granted, when GDPR was born it was after a 2-year gestation (transition) period. What followed were many sleepless nights with the new baby when Read More 30 May 2021News.Press releases.ThreatQuotient What Makes a Security Analyst Successful? Investigative ThinkingWhat Makes a Security Analyst Successful? Investigative Thinking LIZ BUSH The new SANS 2021 Report: Top Skills Analysts Need to Master analyzes Read More 30 May 2021News.Versasec Our PKI BrightTALK Coffee Break is over, but It is Not Too Late to Learn MoreDate: 2021-05-26Author: Tatjana Suhorukova, Business Development Previous << Diversity Day at Versasec In many corporations large and Read More 29 May 2021Forcepoint.Gartner.News Defining Zero Trust in the Wake of the Biden Administration’s Cybersecurity Executive OrderConfusion around Zero Trust But what is “Zero Trust”? How is it defined? What are its key components? That is important, because to this Read More 29 May 2021News.Opentext.Press releases What’s new in OpenText eDOCS CE 21.2Law firms and legal departments store thousands of matter-related documents for existing clients. When lawyers and their teams are pressured by Read More 27 May 2021Gartner.McAfee.News Cyber Cyber, Burning Bright: Can XDR Frame Thy Fearful Asymmetry?The outcome of an Attacker’s mission may depend entirely upon a single misplaced charge on a single memory chip on a single server, perhaps Read More 27 May 2021Allied Telesis.News Laying the Network Foundation for a Smart FactoryDigital transformation is the baseline for changes in almost any market. Information sharing between all the company systems become precious Read More 26 May 2021Cofense.News Cofense Virtual Roadshow: How Many Email Security Vendors can you Eliminate?Cofense’s solutions leverage global crowd-sourced phishing intelligence from over 26 million people reporting suspected phish, and offer Read More 25 May 2021Forcepoint.News Dealing with insider risk in the era of remote workForrester and Forcepoint together recently conducted a study to understand insider threat initiatives worldwide with 300 decision-makers. Read More 25 May 2021BeyondTrust.News Dispatches from Anywhere: Securing the Next Wave of Work | BeyondTrustDispatches from Anywhere: Securing the Next Wave of Work | BeyondTrust May 21, 2021 Open You May Also Be Interested In: Our website uses cookies Read More 25 May 2021News.Qualys Reinforce Defense with File Reputation and Trusted Source Intelligence in Qualys FIMMonitoring change events in the file system is both a crucial aspect of security and a critical compliance requirement. A file integrity Read More 24 May 2021McAfee.News Data Localisation – The Magic Bullet?The terms ‘data sovereignty’, ‘data residency’ and ‘data localization’ are a source of confusion for most Read More 23 May 2021News.Press releases.ThreatQuotient.Webinars Threat Intelligence, Integration and Automation in a Modern SOCThreat Intelligence, Integration and Automation in a Modern SOC LIZ BUSH As organizations continue to evolve their security operations maturity Read More 23 May 2021News.Versasec Celebrating Cultural DiversityDate: 2021-05-21Author: Ellen Thorén, Program Manager Previous << Zero Trust and MFA Thwart Breaches Today is a good day to talk about the Read More 22 May 2021Forcepoint.News Don’t be left behind by the unraveling of the enterpriseBut the cybersecurity industry has been going through a decade of change, and together we’ve arrived at yet another inflection point. Today’s Read More 22 May 2021News.Opentext 5 leadership lessons from the pandemicEvery area of business has faced its own challenges over the past 15 months—from sales and Read More 21 May 2021Micro Focus.News Micro Focus Account Management. Great Relationships. Great Teams.I am Dr. James D. Borderick, and I look after the Competitive Benchmark research for Micro Focus, which I have been doing for over five years. I Read More 20 May 2021McAfee.News.Webinars Miles Wide & Feet Deep Visibility of Carbanak+FIN7The MITRE Engenuity ATT&CK® Evaluation (Round3) focused on the emulation of Carbanak+FIN7 adversaries known for their prolific intrusions Read More 19 May 2021Cofense.News DARKSIDE Ransomware Operations Abuse Trusted PlatformsDARKSIDE Ransomware Operations By Dylan Duncan Since the malware release, DARKSIDE ransomware operators, and affiliates that use the service, Read More 18 May 2021BeyondTrust.News Will DarkSide Pipeline Ransomware Attack Fuel Cybersecurity Upgrades for Critical Infrastructure? | BeyondTrustWill DarkSide Pipeline Ransomware Attack Fuel Cybersecurity Upgrades for Critical Infrastructure? | BeyondTrust Go Beyond 2021: Customer + Read More 18 May 2021News.Qualys Nefilim RansomwareOver the past year there has been a rise in extortion malware that focuses on stealing sensitive data and threatening to publish the data unless Read More 18 May 2021News.Riverbed Secure SMB Traffic Optimization with the Riverbed WinSec Controller | RiverbedServer Message Block (SMB) traffic is a very common type of network traffic in most organizations, and it’s one of the most common types Read More 17 May 2021Micro Focus.News Volunteering Goes VirtualBeing able to give back, pay it forward – or simply help others by volunteering – has never been more important, particularly in the midst of the Read More 16 May 2021News.ThreatQuotient Security Automation: Data is More Important Than ProcessAutomation can’t be just about running the process, but must include three important stages I’ve written a lot about Read More 16 May 2021News.Versasec Zero Trust and MFA Thwart BreachesDate: 2021-05-13Author: Carolina Martinez, General Manager Previous << New perspective of the Versasec offices Over the weekend, a Read More 15 May 2021Forcepoint.News.Press releases.Webinars (Un)expected Lessons in Cybersecurity – Business and Security Strategies for The Post-Pandemic Unbound EnterpriseWith more than two decades in IT security, I’ve seen a lot. After all, I’ve been on record predicting all sorts of things that come true (or Read More 15 May 2021News.Opentext.Press releases The strategic value of low-code developmentWith organizations continuing to push toward digital transformation, the developers and business analysts within these businesses hold the key to Read More 14 May 2021Micro Focus.News Embracing our PLANET TogetherBringing people together who are passionate about reducing their environmental impact – this is the spirit of Micro Focus’ newest employee Read More 13 May 2021McAfee.News.Webinars What the MITRE Engenuity ATT&CK® Evaluations Means to SOC TeamsWhen the infamous Carbanak cyberattack rattled an East European bank three years ago this month few would have guessed it would later play a Read More 12 May 2021Cofense.News Pipeline PhishingWe keep saying it. It almost always starts with a phish. By Rohyt Belani, CEO Instead, media and pundits talk about the symptoms and how those Read More 11 May 2021Forcepoint.News Federal Agencies Like DHS Look Ahead to Strengthening Security and Reliability of Federal Information SystemsFor an agency like the Department of Homeland Security (DHS), which plays a leadership role across government in securing our country’s Read More 11 May 2021BeyondTrust.News Rethinking Remote Access Security: Can Zero Trust Replace VPNs? | BeyondTrustRethinking Remote Access Security: Can Zero Trust Replace VPNs? | BeyondTrust Go Beyond 2021: Customer + Partner Conference // June 7-11 // Read More 11 May 2021Ivanti.News Find Out How to Navigate the Everywhere Workplace with Ivanti Extended ProductsLast year was difficult for organizations of all sizes as the world made the abrupt shift to Work from Home (WFH), but don’t worry because Ivanti Read More 11 May 2021News.Qualys Google Android May 2021 Security Patch Vulnerabilities: Discover and Take Remote Response Action Using VMDR for Mobile DevicesThe recently released Android Security Bulletin for May 2021 addresses 40 vulnerabilities, out of which 4 are rated as critical vulnerabilities. Read More 10 May 2021McAfee.News RSA Conference 2021: The Best Place to Strengthen Your ResilienceAhead of the RSA virtual conference, I spoke with a few of my colleagues about the major themes we should expect to see at RSA this year. This Read More 9 May 2021News.ThreatQuotient ThreatQuotient Launches Data-Driven Approach to SOAR and XDR, Accelerating Detection & ResponseLeader in security operations solutions continues industry-first innovations with a new platform capability to streamline and simplify automation Read More 9 May 2021News.Versasec New perspective of the Versasec R&D officesDate: 2021-05-05Author: Joakim Thorén, CEO Previous << 400 Customers Life and work are all about perspectives, sometimes quite literally. Read More 8 May 2021Forcepoint.News Taking Remote Browser Isolation (RBI) to the next level in SASEToday, we announced that Forcepoint has acquired Cyberinc, a true innovator in the remote browser isolation industry. Their unique Isla Smart Read More 8 May 2021News.Opentext 4 reasons why technology is vital—during and after ‘unprecedented’ timesOrganizations rely on information to anticipate trends, take advantage of new opportunities, and succeed in today’s world. As organizations Read More 6 May 2021Gartner.McAfee.News McAfee Recognised in 2021 Gartner Solution Scorecard ReportGartner also has a separate team of analysts called the Technical Professionals Team that evaluates single products in greater depth. Their Read More 5 May 2021Cofense.News Phishing Victims’ Initiative Exploited by BazarBackdoor Campaigns in Attempts to Avoid DetectionThreat actors using BazarBackdoor have brought an unusual set of lures, techniques and infrastructure to enterprise users, exemplified in two Read More 4 May 2021News.Titus Data Security Best Practices Every CISO Should KnowAligning Data Security with Organizational Strategy The responsibility for an organization’s information and data security is a hefty one, Read More 4 May 2021LOGbinder.News Latest version of Supercharger brings 50+ updatesTowards the end of 2020 and in to 2021 something big has been happening with Windows Security. Over the past few months, the interest in Read More 4 May 2021Forcepoint.News 5 Steps to SASE: Protecting Remote Workers, a discussion with Dr. Chase CunninghamTo shed some light on this crucial topic, I recently sat down with several experts to talk about five of the most common steps that businesses Read More 4 May 2021BeyondTrust.News 10 Tips for Improving IT Support Efficiency | BeyondTrust10 Tips for Improving IT Support Efficiency | BeyondTrust Go Beyond 2021: Customer + Partner Conference // June 7-11 // Register Here Dismiss May Read More 4 May 2021News.Qualys The Convergence of Endpoint Protection with Detection & ResponseBy almost every account, trend, or metric, the cybersecurity threat landscape is getting worse year over year. According to Qualys Labs, 2020 saw Read More 3 May 2021News.Riverbed Unify Network and Security Operations | NetSecOps Collaboration | RiverbedFor decades network operations and security operations teams have functioned separately. That’s starting to change and with good reason, even Read More 2 May 2021Gartner.News.Press releases.ThreatQuotient Why answering the question of orchestration vs automation will improve your security effectivenessWhy answering the question of orchestration vs automation will improve your security effectiveness ANTHONY STITT The investment in security Read More 2 May 2021News.Versasec Versasec is 400 customers strongDate: 2021-04-28Author: Joakim Thorén, CEO Previous << Support Microsoft MIM and FIM CM 400. Four. Hundred. Four hundred. Four-zero-zero. Read More 1 May 2021Forcepoint.News Q&A with Carahsoft: Shoring up cybersecurity in the face of changing threats and tightening regulationsTo make sense of these issues and gain insights into developing trends, I caught up with Brian O’Donnell, vice president of sales at Carahsoft. Read More 1 May 2021News.Opentext Banks are fighting a multi-front war on fraudAccording to S&P Global, the COVID-19 pandemic caused a “perfect storm” for financial services companies, which witnessed a 238 Read More 29 Apr 2021McAfee.News New Security Approach to Cloud-Native Applications”IDC predicts, by 2025, nearly two-thirds of enterprises will be prolific software producers with code deployed daily, over 90% of new apps Read More 28 Apr 2021Cofense.News Sharing Documents via SharePoint Is Always a Good Idea: Not always…The Cofense Phishing Defense Center (PDC) has discovered a phishing campaign that targets Office 365 users and includes a convincing SharePoint Read More 27 Apr 2021Forcepoint.News A Look Back at To The Point Cybersecurity Podcast Episodes in Q1Jared Quance, an insider threat program manager for the U.S. government, shared his take on the role privileged users play, and how Sunburst has Read More 27 Apr 2021BeyondTrust.News BeyondTrust Bolsters Market-Leading Endpoint Privilege Management for Windows & Mac | BeyondTrustBeyondTrust Bolsters Market-Leading Endpoint Privilege Management for Windows & Mac | BeyondTrust April 22, 2021 Open You May Also Be Read More 27 Apr 2021News.Qualys WhatsApp Vulnerabilities: Automatically Discover and Remediate Using VMDR for Mobile DevicesWhatsApp has recently fixed critical and high-severity vulnerabilities affecting WhatsApp for Android, WhatsApp Business for Android, WhatsApp Read More 25 Apr 2021News.ThreatQuotient As You Modernize Your SOC, Remember the Human ElementAs Security Operations Centers (SOCs) mature, they need to tackle some tough challenges with respect to data, systems and people As Security Read More 25 Apr 2021News.Versasec MIM migration to vSEC:CMS is an easy and fastDate: 2021-04-23Author: Joakim Thorén, CEO Previous << Making PKI Inroads in Egypt The good news? Versasec makes migration to vSEC:CMS Read More 25 Apr 2021Allied Telesis.News Three Key Reasons to Deploy an IP-Based Video Surveillance System for Government ApplicationsThe global threat landscape is a huge cause for concern for many organizations and governments. Increasingly, they rely on video surveillance to Read More 24 Apr 2021Forcepoint.News Zero Trust: A Smarter Approach to SecurityPeople and wherever they access apps and data represent the new perimeter. Zero Trust is a security framework that can help safeguard the people Read More 24 Apr 2021News.Opentext Cutting the environmental costs of faxFax remains the secure communications backbone for healthcare, finance, government and other industries around the world. Each year, fax machines Read More 23 Apr 2021Micro Focus.News The Role of Technology in Driving SustainabilityJoin Us and Pledge to Do an Act of Green for Earth Day Climate change is a subject that is important to everyone, our customers, partners, Read More 22 Apr 2021Carbon Black.News VMware Carbon Black Delivers High-Fidelity Insight at Every Step of MITRE Engenuity ATT&CK® EvaluationFor the third year in a row, VMware Carbon Black today announced its participation in MITRE Engenuity’s third annual ATT&CK® Read More 22 Apr 2021McAfee.News Lessons We Can Learn From Airport SecurityThe airport operators are a lesson in supply-chain and 3rd party communications. They cooperate with airlines, retailers and government agencies, Read More 21 Apr 2021Cofense.News Home Buyers Beware – Tax-Themed Phish Hosted on TypeformPurchasing a home can be exciting for potential buyers. However, the loan application process can at times be both stressful and exhausting as Read More 20 Apr 2021Forcepoint.News.Webinars Keeping up with a Hybrid Workforce Requires Fast Tracking SASE in 2021Today, organizations must be able to provide fast, reliable, and secure access to their employees no matter where they’re located or what devices Read More 20 Apr 2021BeyondTrust.News Driving Change to Close the Cybersecurity People Gap | BeyondTrustDriving Change to Close the Cybersecurity People Gap | BeyondTrust April 19, 2021 Open You May Also Be Interested In: Our website uses cookies to Read More 20 Apr 2021News.Qualys April 2021 Patch Tuesday – 108 Vulnerabilities, 19 Critical, AdobeThis month’s Microsoft Patch Tuesday addresses 108 vulnerabilities, of which 19 are rated critical severity and 88 are rated high severity. Adobe Read More 18 Apr 2021News.Press releases.ThreatQuotient Pandemic sees organizations of all sizes and industries invest in CTIPandemic sees organisations of all sizes and industries invest in CTI ANTHONY STITT After a year full of unknowns and new normals, knowledge is Read More 18 Apr 2021News.Versasec Egypt PKI expert joins VersasecDate: 2021-04-14Author: Joakim Thorén, Founder and CEO Previous << Versasec Releases vSEC CMS S6.0 Versasec’s Global Presence is a Big Plus Read More 18 Apr 2021News.Riverbed Do’s and Don’ts of B2B Marketing in a Crisis | COVID-19, 1 Year Later | RiverbedIn March 2020, I was in London meeting with customers, partners and teammates and upon my return to the Bay Area, organizations were preparing Read More 17 Apr 2021Indeed Identity.News Roundtable: Best PAM approach – what requires your full attentionPrivileged access management is an important part of any cybersecurity policy. With the PAM market predicted to continue rapidly growing in the Read More 17 Apr 2021News.Opentext OpenText World Europe 2021—Grow with OpenTextWe have never worked this fast, and we will never work this slow again. In my keynote at OpenText World Europe 2021, I talked about the nexus of Read More 17 Apr 2021Array Networks.News Web Application Firewalls: More Essential Than EverVirtual meetings, online events, digital transactions and increased social media engagement is how many of us will remember changes brought about Read More 16 Apr 2021Micro Focus.News INSPIRE 20 Podcast: Meet Erik Day, Senior Vice President, Small Business, Dell TechnologiesErik Day, a senior vice president who leads Dell Technologies’ small-business division in North America and Brazil shares his thoughts on how he Read More 14 Apr 2021Cofense.News Computer Based Training: More of a Good Thing for More AudiencesThe Cofense Security Awareness Library has been updated with a clean new look for an improved learner experience in the latest (v6) edition of Read More 13 Apr 2021Forcepoint.News How Three Forcepoint Customers Protect Their Data While Enabling ProductivityForcepoint Customer Stories Why must we accept that breaches are inevitable? While traditional data protection provides visibility into your Read More 13 Apr 2021BeyondTrust.News The Top 10 Secrets of Admin Users | BeyondTrustThe Top 10 Secrets of Admin Users | BeyondTrust April 12, 2021 Open You May Also Be Interested In: Our website uses cookies to provide a better Read More 13 Apr 2021News.Qualys Google Android April 2021 Security Patch Vulnerabilities: Discover and Take Remote Response Action Using VMDR for Mobile DevicesThe recently released Android Security Bulletin for April 2021 addresses 36 vulnerabilities, out of which 2 are rated as critical Read More 11 Apr 2021News.Press releases.ThreatQuotient ThreatQuotient appoints Ramiro Cespedes as new Threat Intelligence Engineering ManagerMadrid, 8th April 2021 – ThreatQuotient, leader in Cyber Intelligence Operations Platforms, today announced the appointment of Ramiro Read More 11 Apr 2021Ivanti.News Service the Everywhere WorkplaceDrive outcomes with insights What if you could give employees reliably great experiences while improving outcomes across your organization? Read More 10 Apr 2021Forcepoint.News EMEA Perspective – Build Trust like a BankThe 2020 pandemic and cloud adoption have at least one thing in common – both have led to an increased digital surface of exposure and added Read More 10 Apr 2021News.Opentext Why is digital process automation critical to digital transformation?The pandemic has driven organizations to assess their business processes—and the people, systems and technology that support Read More 9 Apr 20219 Apr 2021Group-IB.News What goes around comes around: hackers leak other hackers’ data onlineSingapore, 08.04.2021 — Group-IB, a global threat hunting and adversary-centric cyber intelligence company, discovered that user data of the Read More 8 Apr 2021Carbon Black.News COVID-19 and HIPAA Enforcement Discretion Leaves Healthcare Organizations Vulnerable to Ransomware AttacksPatient engagement is a term that has been discussed in healthcare for years. But now, it’s an urgent priority as providers work to Read More 7 Apr 2021Cofense.News It Starts with a PhishJust as we were getting ready to put a bow on 2020, we were hit with the news of SolarWinds. Incident Response teams were barely coming up for Read More 6 Apr 2021News.Titus What is Data Security?What are the Barriers to Data Security? Today’s organizations exchange data at a larger volume and faster pace than ever before, and they do so Read More 6 Apr 2021BeyondTrust.News Addressing Malware, Threat Actors, & LotL Exploits with Application Control, & Allow / Deny Listing | BeyondTrustAddressing Malware, Threat Actors, & LotL Exploits with Application Control, & Allow / Deny Listing | BeyondTrust March 31, 2021 Open You Read More 4 Apr 2021News.ThreatQuotient Improve Data Utilization to Modernize the SOCThe Ability to Think Global, Act Local is One of the Hallmarks of a Modern Security Operations Center If you want to modernize your SOC to focus Read More 4 Apr 2021News.Versasec Versasec Releases vSEC:CMS S6.0Date: 2021-03-31Author: Joakim Thorén, Founder and CEO Previous << How To Use BitLocker with Smart Cards For the Versasec team, it’s Read More 4 Apr 2021Allied Telesis.News Strategies to Address Security Risks in IIOT DeploymentsOver the past few years, the Internet of Things (IoT) has become increasingly ubiquitous. Over 27 billion networked devices will be online in Read More 3 Apr 2021cPacket Networks.News cPacket Networks Delivers Industry-leading 100Gbps Packet Capture and Analytics Solution for Network ObservabilityThe post cPacket Networks Delivers Industry-leading 100Gbps Packet Capture and Analytics Solution for Network Observability appeared first on Read More 3 Apr 2021Forcepoint.News.Webinars Zero Trust and SASE: Teaming Up to Stop ThreatsBut back here in the real world, we’re seeing several dramatic shifts in the cybersecurity industry play out. As people fled their offices last Read More 3 Apr 2021News.Opentext Future-proofing your business with the cloudIt is no secret that technology has changed the way we work, socialize and learn. Most people cannot imagine their life or career without Read More 3 Apr 2021News.Riverbed Four Trends Guiding HR in 2021 and Beyond | COVID-19, 1 Year Later | RiverbedIt’s hard to believe that it’s been over a year since the onset of the global pandemic. I remember thinking initially that our offices would be Read More 2 Apr 2021News.PROFITAP Industrial Network Visibility and Cybersecurity in One Robust SolutionThe integration of advanced Operational Technology (OT) and Information Technology (IT) networks, high tech automation, supervisory control and Read More 2 Apr 2021Micro Focus.News Micro Focus is an Industry Leader in Consulting within Information Management and GovernanceAccording to Customers, how do we measure how we perform at consulting compared with our Competitors? Micro Focus uses double-blind competitive Read More 1 Apr 2021Carbon Black.News Linux Distribution Coverage Extended Across the VMware Carbon Black CloudIn 2020, a record 56 new Linux malware families were discovered. We are now seeing this trend continue into the new year with the latest Read More 1 Apr 2021Gartner.McAfee.News.Webinars 5 Ways MVISION XDR Innovates with MITRE ATT&CK It is less well known how these tools align to improve the efficacy of your cybersecurity defenses leveraging key Read More 31 Mar 2021Indeed Identity.News 5 global PKI trends that affect any enterpriseEnsuring the highest level of security, Public Key Infrastructure enables core enterprise processes of users’ authentication, encryption Read More 30 Mar 2021Forcepoint.News Forcepoint Honored to be a Finalist in Two Microsoft Security 20/20 Award CategoriesIt’s hard to believe that just over a year ago, the Forcepoint team was focused on delivering Azure Sentinel integrations across our NGFW, DLP Read More 30 Mar 2021BeyondTrust.News Multicloud Security: More Clouds More Problems | BeyondTrustMulticloud Security: More Clouds More Problems | BeyondTrust Free Privileged Account Discovery Tool: Identify & secure credentials to stop Read More 30 Mar 2021News.Qualys Unified Dashboard Preview for Enhanced Security VisualizationQualys has introduced the Unified Dashboard Framework (UDF) to enrich your dashboarding experience. Unified Dashboard (UD) brings information Read More 28 Mar 2021News.Press releases.ThreatQuotient Women in Cybersecurity – Melissa Smith – King & UnionWomen in Cybersecurity PROFILE – MELISSA SMITH Melissa SmithKing & Union – Vice President, Strategic Partnerships & Read More 27 Mar 2021Forcepoint.News “Tiny Crimes” – How Minor Mistakes When Remote Working Could Lead to Major Cybersecurity BreachesAs a leader in user and data protection, Forcepoint knows that understanding users’ behavior is critical for protecting against emerging Read More 27 Mar 2021News.Opentext Supercharge your contact center with real-time speech analyticsCustomer satisfaction, more than ever, has become a key metric for measuring business success. The quality of your products and level of support Read More 25 Mar 2021Carbon Black.News.Webinars Women in Security Part 5: Meet Lavine Oluoch, Threat AnalystThis post is part of our Women’s History Month series – follow along with us on Twitter @VMwareCarbonBlack In continued Read More 24 Mar 2021Cofense.News COVID 19 Vaccine Phishing Email: Can’t Vaccinate Against This Phish – Or Can You?It’s no secret that the COVID-19 vaccine is being rolled out and met with extreme enthusiasm. Some companies are reaching out to their employees Read More 23 Mar 2021Forcepoint.News See Zero Trust in Action at the Zero Trust Demo ForumThe Zero Trust Demo Forum represents a great place to see Zero Trust solutions in action and to learn about a variety of aspects to consider for Read More 23 Mar 2021BeyondTrust.News Zero Trust: New Name, New Tech for a Classic Security Approach | BeyondTrustZero Trust: New Name, New Tech for a Classic Security Approach | BeyondTrust Free Privileged Account Discovery Tool: Identify & secure Read More 23 Mar 2021News.Qualys Qualys Leadership Update: Moving Forward TogetherToday, we announced that Philippe Courtot has resigned from his CEO role. As you may know, Philippe took a leave of absence due to health issues Read More 22 Mar 2021Micro Focus.News Micro Focus – Installation Experience SensationMicro Focus is Leader in the Installation Experience According to Customers, how do we measure how we perform at Installation compared with our Read More 21 Mar 2021News.ThreatQuotient Want to Modernize Your SOC? Start with DataHow to Tackle the Data Challenge to Improve and Accelerate Detection and Response I’ve discussed before how Security Operations Read More 21 Mar 2021News.Versasec We take you through the smart card-Bitlocker setup process, step-by-stepDate: 2021-03-18Author: Chin Jien “C-J” Lau, Technical Consultant Previous << Versasec logs best year yet Data theft remains one of the Read More 20 Mar 2021News.Opentext What’s new in OpenText Extended ECM Platform CE 21.1 and OpenText Content Suite Platform CE 21.1OpenText™ continues to push the boundaries of industry leading Content Services with these latest enhancements that provide better ways to Read More 19 Mar 2021cPacket Networks.News cPacket Networks Showcases Market-Leading Intelligent Observability Platform at Microsoft IgniteThe post cPacket Networks Showcases Market-Leading Intelligent Observability Platform at Microsoft Ignite appeared first on cPacket Networks.Read More 19 Mar 2021News.ThreatMark ThreatMark recognized in Now Tech: Enterprise Fraud Management Q1 2021 reportWe’re excited to announce that ThreatMark has been recognized as an Enterprise Fraud Management Provider in Forrester’s Now Tech: Enterprise Read More 18 Mar 2021Carbon Black.News.Webinars Fighting Back in 2021: 4 Best Practices for Security Teams“Attacks these days don’t have a natural beginning or ending. For an adversary, every attack is an opportunity to learn something Read More 18 Mar 2021News.Riverbed 365 Days of 100% Remote Work | Lessons Learned and the Future of Work | RiverbedJust over a year ago today, I wrote a note to our employees that we were planning to close our offices for at least two weeks due to COVID-19. Read More 17 Mar 2021Indeed Identity.News Where does PKI evolution go? – Interview with Nevenko BartolinčićThere is currently much controversy over the PKI status in modern cybersecurity which raises a number of curious questions. What is the PKI role Read More 16 Mar 2021News.Titus What are Data Security Solutions and How do They Work?Georgina Stockley · Thursday, March 11th, 2021 Data is one of the valuable commodities shared by all organizations regardless of size, Read More 16 Mar 2021BeyondTrust.News Dangers of IoT Privilege Management Blind Spots Exposed in Verkada Security Camera Breach | BeyondTrustDangers of IoT Privilege Management Blind Spots Exposed in Verkada Security Camera Breach | BeyondTrust Free Privileged Account Discovery Tool: Read More 14 Mar 2021News.Press releases.ThreatQuotient Women in Cybersecurity – Michelle MattearWomen in Cybersecurity PROFILE – MICHELLE MATTEAR Michelle MattearThreatQuotient – Director, Customer Success What do Read More 14 Mar 2021Allied Telesis.News Lifting the Lid: Explaining SD-WANIf your modern business has more than one geographic location, you‘ll have heard the term SD-WAN before. Short for Software Defined Wide Area Read More 13 Mar 2021News.Opentext Grow Faster with OpenText Cloud Edition 21.1Modern organizations know that accelerating digital transformation is critical to their success. The launch of OpenText™ Cloud Edition (CE) Read More 12 Mar 2021Micro Focus.News Celebrating International Women’s Day (IWD) at Micro FocusAt Micro Focus, we celebrate the many achievements of women colleagues as well as in our communities and in our personal lives on International Read More 11 Mar 2021Carbon Black.News 2021 Cybersecurity Outlook: Attackers vs. DefendersCOVID-19, One Year Later 2020 was undoubtedly a defining year for cybersecurity – a year that ended with the SolarWinds breach, which Read More 11 Mar 2021Ivanti.News March Patch Tuesday 2021There was an interesting start to March, with four Exchange Server exploits and an out of band update. There is an additional Zero Day Read More 11 Mar 2021McAfee.News Why MITRE ATT&CK Matters?To enable practitioners in operationalizing these strategies, the knowledge base provides the “why” and the “what” with Read More 10 Mar 2021Cofense.News Meeting with A Phish: Zoom-Themed Phish in UseThe importance of having contactless, digital conferencing software (such as Zoom or Microsoft Teams) is well understood by many companies Read More 9 Mar 2021BeyondTrust.News VPNs: Will Zero Trust & Improved Secure Architectures Spell the End? | BeyondTrustVPNs: Will Zero Trust & Improved Secure Architectures Spell the End? | BeyondTrust Free Privileged Account Discovery Tool: Identify & Read More 9 Mar 2021News.Qualys Qualys Update on Accellion FTA Security IncidentNote: Updated March 4 with additional detail. New information has come out today, March 3, related to a previously identified zero-day exploit in Read More 8 Mar 2021McAfee.News.Webinars The Fastest Route to SASEDecision makers seek a faster, more efficient high road to cloud and network transformation without compromising security. The need for speed and Read More 7 Mar 2021News.Press releases.ThreatQuotient Women in Cybersecurity – Katie Teitler – Tag CyberWomen in Cybersecurity PROFILE – KATIE TEITLER Katie TeitlerTAG Cyber – Senior Cyber Security Analyst What do you do at Tag Read More 6 Mar 2021Forcepoint.News Advancements in Invoicing – A highly sophisticated way to distribute ZLoaderSpam campaigns using this new distribution chain first started to appear in early February 2021. The content of the emails follow the Read More 6 Mar 2021News.Opentext What’s new in Vendor Invoice Management CE 20.4Currently, there are vast computing powers available to the end customer. However, this can cause complete chaos when it comes to managing the Read More 4 Mar 2021Carbon Black.News Women in Security: Celebrating Women’s History MonthIn celebration of Women’s History Month, we are honoring all of the women at VMware who inspire, lead, innovate and set the stage for the Read More 4 Mar 2021McAfee.News.Webinars Hacking Proprietary Protocols with Sharks and PandasThis course of events demands that both offensively and defensively minded “good guys” band together to remove the unknown from as Read More 3 Mar 20213 Mar 2021News REAL Security The Wall-builder of the year 2020We are honoured to receive recognition for our efforts and especially expertise in Next Generation Firewall field from our long term loyal and Read More 3 Mar 20213 Mar 2021News WEBINAR CyberSocial: Analysis of a Threat Report and how to make it actionable?In this CyberSocial, ThreatQuotient and FireEye will cover the response process from initial threat report to the action taken, to Read More 3 Mar 2021News.Riverbed Fixing Network Performance Issues Before Users Notice | Unified NPM | RiverbedThis reactive modality can create a material impact to user productivity and has a knock on effect that impacts the organisation’s customers and Read More 3 Mar 2021News.Riverbed Fixing Network Performance Issues Before Users Notice | Unified NPM | RiverbedFor many organisations, the status quo involves IT teams troubleshooting and firefighting network and application performance issues after users Read More 3 Mar 2021Cofense.News Up and Coming Phishing Campaign Is Taxing to UsersWith U.S. tax season upon us, it’s time to remind our users to watch for emails hitting their inboxes related to tax documents. Threat actors are Read More 2 Mar 2021BeyondTrust.News How to Manage and Secure Service Accounts: Best Practices | BeyondTrustHow to Manage and Secure Service Accounts: Best Practices | BeyondTrust Free Privileged Account Discovery Tool: Identify & secure credentials Read More 2 Mar 2021News.PROFITAP Bringing network visibility to unmanaged power utility substationsProfitap was tasked by a leading power utility company in a South-central State in the USA to provide network visibility to a group of unmanaged Read More 28 Feb 2021News.Niagara Networks.Press releases PCI Compliance – What is it, why is it needed and who needs to comply?Payment processing security has, in technology terms a long history. Toward the end of 2004, five major credit card companies (American Express, Read More 28 Feb 2021News.ThreatQuotient Elevate the Value of Threat Intelligence in the SOCSecurity Operations Centers (SOCs) Are Now Becoming Detection and Response Organizations More organizations are producing and consuming cyber Read More 28 Feb 2021News.Versasec How Thales Accelerate 2021 Made Thinking Outside the Box a Game ChangerDate: 2021-02-24Author: Tatjana Suhorukova, Business Development Previous << Feeling SASE As social distancing and stay-at-home orders Read More 27 Feb 2021Forcepoint.News EMEA Perspective – Building Resilient CybersecurityIt’s no secret that hackers outnumber the cybersecurity professionals trying to stop them. And that gap will likely continue to widen. But Read More 27 Feb 2021News.Opentext Tackling the challenges of remote working during a pandemicPlanning flight operations is a complex and time-critical task, made even more challenging during the coronavirus pandemic. Eurowings, a Read More 27 Feb 2021Array Networks.News 6 Networking Trends in 2021: Let’s Get Braced for the “Next Normal”Over the last decade, we’ve seen some of the most significant disruptions in networking technology. However, nothing beats the speed at Read More 26 Feb 2021Micro Focus.News INSPIRE 20 Podcast: Meet Rod Flavell, CEO, FDM GroupINSPIRE 20 Podcast: Meet Rod Flavell, CEO, FDM Group Rod Flavell, founder and chief executive officer of the FDM Group, ensures that inclusivity Read More 25 Feb 2021Carbon Black.News VMware Carbon Black Named to the 2021 CRN Security 100 ListWe are proud to announce that CRN®, a brand of The Channel Company, has named VMware Carbon Black to its annual Security 100 list. The Read More 24 Feb 20218 Mar 2021News UTIMACO WEBINAR: Securing your IT INFRASTRUCTUREJOIN US on March 11th where we will be presenting you how to ensure your IT infrastructure from attacks. In this webinar we discuss the Read More 24 Feb 2021Cofense.News Telegram Utilized for Harvesting CredentialsTelegram is a popular messaging app. Its encrypted messages, and potential message self-destruct options, can be attractive to legitimate users Read More 23 Feb 2021BeyondTrust.News 3 Powerful Tools for CISOs to Boost their Organizational Influence | BeyondTrust3 Powerful Tools for CISOs to Boost their Organizational Influence | BeyondTrust Free Privileged Account Discovery Tool: Identify & secure Read More 21 Feb 2021News.Press releases.ThreatQuotient Reducing Enterprise Cyber Risk During COVID-19Reducing Enterprise Cyber Risk During COVID-19 ED AMOROSO This article was shared with the TAG Cyber community during the earliest days of the Read More 21 Feb 2021News.Versasec A shifting data access and storage dynamic has given rise to a new security category: Secure access service edgeDate: 2021-02-18Author: Ellen Thorén Previous << Sandia National Laboratories Casestudy The growth of mobile, edge and cloud data are Read More 20 Feb 2021Forcepoint.News Help me trojanize you – Microsoft Compiled HTML Help is back for another roundIn the past few weeks, malicious spam campaigns have surfaced that include attachments of varying archive types. Whilst the archives were mostly Read More 20 Feb 2021News.Opentext Modernize your legacy applicationsMany organizations continue to hold onto legacy applications and systems for compliance and regulatory reasons. But they find it expensive and Read More 18 Feb 2021McAfee.News Domain Age as an Internet Filter CriteriaDomain Age Feature Definition The sites and domains of the internet are constantly changing and evolving. In the first quarter of 2020 an average Read More 18 Feb 2021News.Riverbed Pinpointing Application Performance Issues with Unified NPM | RiverbedWith employees and business partners working from home due to the pandemic, non-enterprise internet connections have exacerbated the issue of Read More 18 Feb 2021Allied Telesis.News How Networking Supports Zero Defects ManufacturingIn recent years, manufacturing enterprises are accelerating their digital transformation as part of the fourth industrial revolution (Industry Read More 17 Feb 2021Indeed Identity.News The New Normal of European PKI – An Interview With CA Expert Adam RossThe roundtable «Evolution of Trust: Get ready for PKI 2.0» was about the most confusing, yet vital topics that remain puzzles to many Read More 17 Feb 20215 Mar 2021Extrahop.News Real security is extending their presence with a NDR market leader ExtraHop across the Central Eastern EuropeReal security, a Slovenian based Value Added distributor enters Poland, Czech Republic and Bulgaria by joining forces with ExtraHop, a market Read More 17 Feb 2021Cofense.News Phish Found in SEG-Protected Environments Week ending February 12, 2021100% of the phish seen by the Cofense Phishing Defense Center (PDC) have been found in environments protected by Secure Email Gateways (SEGs), Read More 16 Feb 2021BeyondTrust.News Aligning Credential & Identity-Based Risk Management with Government Mandates | BeyondTrustAligning Credential & Identity-Based Risk Management with Government Mandates | BeyondTrust Free Privileged Account Discovery Tool: Identify Read More 16 Feb 202116 Feb 2021News JOIN THE EKRAN SYSTEM PARTNER PROGRAMEkran System® is a full cycle insider threat management platform that focuses on three core goals: deter, detect, and disrupt Date: Friday, 19th Read More 16 Feb 2021News.Qualys Expand Your Vulnerability & Patch Management Program to Mobile Devices with Qualys VMDRAs mobile devices have become ubiquitous in almost every business process, whether in bank branches, manufacturing sites or retail stores, they Read More 14 Feb 2021News.Niagara Networks A brand-new year and cybersecurity defense thoughtsIt is a brand-new year, and by now you would probably hear from someone that they were busy or sharing about their unique virtual SKO experience.Read More 14 Feb 2021News.Press releases.ThreatQuotient Automate, Adopt, Adapt: How Cyber Threat Intelligence Evolved over the last 12 monthsAutomate, Adopt, Adapt: How Cyber Threat Intelligence Evolved over the last 12 months LIZ BUSH The SANS 2021 Cyber Threat Intelligence (CTI) Read More 13 Feb 2021Forcepoint.News Why Zero Trust is Needed in the Real World TooA real-word example of why Zero Trust matters But the need for Zero Trust doesn’t stop at the cyber edge. With so many processes in our daily Read More 13 Feb 2021News.Opentext What is digital experience?Digital experience inhabits a realm packed with similar terms. You have digital experience management (DXM), customer experience (CX), customer Read More 12 Feb 2021Micro Focus.News Spotlight on Black History MonthAt Micro Focus, our theme for Black History Month in 2021 is “Embracing the Past While Building for the Future”. We caught up with Eric Beulah, Read More 11 Feb 2021Ivanti.News February Patch Tuesday 2021Second Patch Tuesday of 2021 is here and while the CVE counts are low there are a number of publicly disclosed and zero day vulnerabilities to be Read More 11 Feb 2021Gartner.McAfee.News XDR – Please Explain?Security vendors have spent the last two decades providing more of the same orchestration, detection, and Read More 10 Feb 2021Cofense.News Phish Found in Proofpoint-Protected Environments Week ending February 5, 2021Cofense solutions enable organizations to identify, analyze, and quarantine email threats in minutes. 100% of the phish seen by Read More 9 Feb 2021BeyondTrust.News A Cybersecurity Wellness Check for the Healthcare Industry | BeyondTrustA Cybersecurity Wellness Check for the Healthcare Industry | BeyondTrust Free Privileged Account Discovery Tool: Identify & secure Read More 9 Feb 2021News.Qualys Unified SaaS Application Security, Detection, and ResponseOrganizations are rapidly embracing Software as a Service (SaaS) applications for scalability, ease & flexibility of use, and the benefits of Read More 8 Feb 2021McAfee.News 6 Best Practices for SecOps in the Wake of the Sunburst Threat CampaignPlan, test and continuously improve your SecOps processes with effective purple-teaming exercises. Try to think like a stealthy attacker and Read More 7 Feb 2021News.Press releases.ThreatQuotient How ThreatQ Helps Bridge the Threat Hunting Skills GapHow ThreatQ Helps Bridge the Threat Hunting Skills Gap LIZ BUSH If you’re not familiar with the TAG Cyber Security Annual, you should be! Read More 6 Feb 2021Forcepoint.News Understanding Insider Threat Before the BreachTwo recent examples of insider threat show how incorrect information can lead to bad decisions. In one, a data scientist who previously tracked Read More 6 Feb 2021News.Opentext For many patients, telehealth is here to stayTelehealth has been a topic of discussion for decades in healthcare. While innovators in medicine and technology have long promoted the Read More 5 Feb 2021Micro Focus.News Strategically #BetterTogether – Micro Focus plus our Channel PartnersHow do we measure how strategic we are to our customers? Micro Focus uses double-blind competitive benchmarking in order to gauge how well we Read More 4 Feb 2021Carbon Black.News The State of Healthcare Cybersecurity: VMware Carbon Black Explores the Surge in Cyber ThreatsOn the frontline of the pandemic, perhaps no industry was impacted and forced to innovate and transform as quickly as healthcare in 2020. Whether Read More 3 Feb 2021News.Riverbed Data Security Challenges in the Rush to the Cloud | RiverbedIn their rush to the cloud, enterprises will need to take into consideration three new data security challenges as they reevaluate where their Read More 3 Feb 2021News.Riverbed Data Security Challenges in the Rush to the Cloud | RiverbedThe challenges of working from home have caused organizations to reevaluate how they look at their networks and the data that lives on them. The Read More 3 Feb 2021Cofense.News Emotet Disrupted but Likely to ReturnBackground Originally a banking Trojan, Emotet evolved to become more of a gateway for other malware families such as Ryuk, TrickBot, Read More 2 Feb 2021News.Titus HIPAA and 2021 Healthcare Data Security TrendsGeorgina Stockley · Tuesday, February 2nd, 2021 The ramifications of this year’s global pandemic will continue to drive unprecedented Read More 2 Feb 2021Forcepoint.News.Webinars How Cybersecurity Changed in 2020 and What it Means for 2021Now, as much of the world continues working from home, that means company data, networks and employees themselves are vulnerable to multiple Read More 2 Feb 2021BeyondTrust.News Understanding Sudo Vulnerability CVE-2021-3156 & How Privilege Management for Unix & Linux Can Help | BeyondTrustUnderstanding Sudo Vulnerability CVE-2021-3156 & How Privilege Management for Unix & Linux Can Help | BeyondTrust Free Privileged Account Read More 2 Feb 2021News.PROFITAP DNS – OR ALSO: WHY IS MY INTERNET NOT WORKING?This blog was written in collaboration with magellan netzwerke GmbH, A Profitap Partner. DNS – OR ALSO: WHY IS MY INTERNET NOT Read More 2 Feb 2021News.Qualys Unpacking the CVEs in the FireEye Breach – Start Here FirstIn a blog post on Dec. 22, 2020, Qualys revealed it has identified 7.5 million instances of vulnerability to the stolen FireEye Red Team Read More 1 Feb 2021McAfee.News Schrems II – A few Things to Keep in Mind!Alas, we have possibly never been so much away of such harmonization. 128 out of 194 countries have put in place legislation to secure the Read More 1 Feb 2021Micro Focus.News Inspiring students to imagine their future careersUnder Pressure For too long, there has been tremendous reliance on parents, schools and government to capture children’s imaginations – to help Read More 31 Jan 2021News.ThreatQuotient ThreatQuotient appoints Eutimio Fernandez as new Country Manager for SpainMadrid, January 29, 2021 – ThreatQuotient, a leader in Security Operations Platforms, today announced the appointment of Eutimio Fernandez Read More 31 Jan 2021News.Versasec For more than 70 years, Sandia National Labs has resolved the nation’s challenging security issues, and they turned to Versasec’s vSEC:CMS to solve their security migration challenges.Date: 2021-01-25Author: Carolina Martinez Previous << Effective Remote PKI Management For more than 70 years, Sandia has delivered Read More 30 Jan 2021Forcepoint.News Managing the Insider Threat – An ISF Panel DiscussionThe goal of the panel discussion was to explore insider threat and the impact it has on cybersecurity while offering tangible solutions for Read More 30 Jan 2021News.Opentext Digitalization in procurementA recent blog on ‘The resilient Procurement organization’ described the benefits of using OpenText™ Extended ECM for SAP® Read More 29 Jan 2021Micro Focus.News Data Privacy Day: Why Protecting Data Matters to Your Bottom LineWhen it comes to data privacy, who do consumers trust? A recent data privacy survey by McKinsey & Company asked 1,000 consumers to rank the Read More 28 Jan 2021Carbon Black.News VMware Carbon Black Champions Data Privacy Day 2021Today is Data Privacy Day, an annual effort hosted by the National Cybersecurity Alliance (NCSA) to raise awareness about the importance of Read More 27 Jan 2021Cofense.News Phish Found in Proofpoint-Protected Environments Week ending January 22, 2021Cofense solutions enable organizations to identify, analyze and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More 26 Jan 2021News.Titus 10 Tips to Protect Your Company´s Data in 2021Georgina Stockley · Monday, January 25th, 2021 The amount, complexity, and relevance of the data that companies handle has increased Read More 26 Jan 2021BeyondTrust.News Privilege Management for Unix & Linux Continues Rapid Growth by Securing Cloud Infrastructure | BeyondTrustPrivilege Management for Unix & Linux Continues Rapid Growth by Securing Cloud Infrastructure | BeyondTrust Free Privileged Account Discovery Read More 24 Jan 2021News.Press releases.ThreatQuotient Threat hunting is now pervasive, learn how the ThreatQ Platform helps support your teamThreat hunting is now pervasive, learn how the ThreatQ Platform helps support your team LIZ BUSH As I mentioned in an earlier blog, threat Read More 23 Jan 2021Forcepoint.News Revolutionising Cybersecurity – SASE Special Report by RaconteurThere are six parts to the paper. It is interspersed with independent market data from the Ponemon Institute, Accelerate Technologies, Accenture Read More 23 Jan 2021News.Opentext We need to talk about contentLet’s start with a question: In the current focus on digital initiatives, are energy companies overlooking the importance of content? And, Read More 22 Jan 202125 Jan 2021News.ThreatQuotient THREATQUOTIENT WEBINAR: Empower the human element with Cyber Threat IntelligenceThe most important asset in your organization is your human resource, who will run the investigation, analyse the data and take actions on it. Read More 22 Jan 2021Micro Focus.News How Many COBOL Programmers Does it Take to Change a Lightbulb?COBOL’s continued popularity receives further evidence. Digital Marketing expert and avid COBOL fan Mark Plant reports that another major Read More 21 Jan 2021Carbon Black.News VMware Carbon Black Cloud™ Awarded Cyber Catalyst DesignationVMware Carbon Black Cloud has been awarded a Cyber CatalystSM designation for its cloud native endpoint and workload protection platforms, which Read More 19 Jan 2021BeyondTrust.News Protecting the Government Workforce of the Future with Secure Remote Access | BeyondTrustProtecting the Government Workforce of the Future with Secure Remote Access | BeyondTrust Free Privileged Account Discovery Tool: Identify & Read More 19 Jan 2021News.Qualys January 2021 Patch Tuesday – 83 Vulnerabilities, 10 Critical, One Zero Day, AdobeThis month’s Microsoft Patch Tuesday addresses 83 vulnerabilities. The 10 Critical vulnerabilities cover Windows codecs, Office, HEVC video Read More 18 Jan 2021News.Riverbed User Experience/App Performance vs. Network Security | Enterprise SD-WAN Trade-Offs | RiverbedIs it possible to meet user expectations and maintain SD-WAN security? One benefit of SD-WAN is that it makes it easy to steer certain traffic Read More 17 Jan 2021News.ThreatQuotient ThreatQuotient Named McAfee’s Global Security Innovation Alliance Partner Of The Year For Second Consecutive YearDepth of integrations, early MVISION Marketplace launch, and the most deal closures within SIA programs distinguishes ThreatQuotient among McAfee Read More 17 Jan 2021News.Versasec As remote workforces grow, managing PKI devices is still simple and effectiveDate: 2021-01-12Author: Anders Adolfsson and Michael Samara Previous << Microsoft Store Due to the 2020 global pandemic, companies are Read More 16 Jan 2021Forcepoint.News Top 10 To The Point Cybersecurity Podcast Episodes of 2020And without further ado, here’s the Top 10 episodes of 2020: Be one of the first 10 to share the episode or this blog and receive your Read More 16 Jan 2021News.Opentext 7 information challenges impacting the semiconductor boom in 2021While the worst of the COVID-19 pandemic slowed the semiconductor sector, it is now recovering and can look forward Read More 15 Jan 2021Micro Focus.News INSPIRE 20 Podcast: Meet Morag Lucey of TeleverdeIt’s back, the INSPIRE 20 podcast returns today with Morag Lucey, CEO of Televerde, a company built on second chances. This forward thinking Read More 14 Jan 2021Carbon Black.News.Webinars Bridge the Gap between Security and IT in Cloud Workload ProtectionIt often feels as though Security and IT are trying to build the same house from different blueprints. Security works tirelessly to stay ahead of Read More 14 Jan 202121 Jan 2021I4P.News Encryption resolution adoptedThe Council of Europe has adopted a resolution on encryption that states that competent authorities must be able to access encrypted data in a Read More 13 Jan 2021Checkmarx.News CVE-2020-35774: twitter-server XSS Vulnerability DiscoveredAfter researching twitter-server, the Checkmarx Security Research Team discovered a reflected cross-site scripting (XSS) vulnerability, assigned Read More 13 Jan 2021Cofense.News Coronavirus Screening and Testing, and a Sense of Urgency Among EmployeesThe Cofense PDC (Phishing Defense Center) has seen a continuous campaign by malicious actors exploiting the COVID-19 pandemic by using cleverly Read More 12 Jan 2021BeyondTrust.News How to Manage Your CI/CD Toolset Secrets with One Solution: 6 Benefits of DevOps Secrets Safe | BeyondTrustHow to Manage Your CI/CD Toolset Secrets with One Solution: 6 Benefits of DevOps Secrets Safe | BeyondTrust Free Privileged Account Discovery Read More 11 Jan 2021Ivanti.News 5G and the Journey to the EdgeRecently, AT&T Cybersecuritypublished important findings in the tenth edition of their Insights report entitled, “ 5G and the Journey to the Read More 11 Jan 2021McAfee.News McAfee Welcomes its ISO 27701 Certificate!At McAfee, we adhere to a set of core values and principles – We Put the Customer at The Core, We Achieve Excellence with Speed and Read More 10 Jan 2021News.ThreatQuotient Perseverance. Pushing Security Operations Forward in 2021We Have the Capabilities to Persevere and Reach the Next Level of Security Maturity For obvious reasons, perseverance has been the theme for 2020 Read More 10 Jan 2021FireEye.News Excelerating Analysis – Tips and Tricks to Analyze Data with Microsoft ExcelIncident response investigations don’t always involve standard host-based artifacts with fully developed parsing and analysis tools. At FireEye Read More 9 Jan 2021Forcepoint.News Looking Back at December’s To The Point Cybersecurity Podcast EpisodesForcepoint To The Point Cybersecurity In December, To The Point Cybersecurity podcast featured discussions with government cyber leaders on Read More 9 Jan 2021News.Opentext Evolving customer communicationsTargeted customer communications are a powerful way to increase engagement and build brand loyalty. Done poorly, Read More 7 Jan 2021McAfee.News The Road to XDRThe Building Pressure for XDR Let’s start with why XDR? The cry for XDR reflects where cybersecurity is today with fragmented, Read More 6 Jan 2021FireEye.News Leveraging Smart Launcher to Evade the EvadersSmart Launcher is a technology designed by FireEye to rapidly upgrade and modify the FireEye MVX sandbox technology used in our Network Security Read More 6 Jan 2021Cofense.News All I Wanted Was for 2020 to End2020 was far from ordinary. By Dylan Duncan Every year, we see threat actors improve their methods and adapt to world events, bringing new Read More 5 Jan 2021News.Qualys Technical Deep Dive Into SolarWinds BreachMany organizations have been compromised by the recent SolarWinds breach, which seems to be a targeted attack against both government and private Read More 5 Jan 2021Centrify.News RSS is deletedThis RSS is deleted because you didn’t use it for long time. Please consider purchasing one of our PRO plans to prevent this in the future Read More 3 Jan 2021News.Riverbed Maximizing Network and Application Performance and Visibility: TFD22 Recap | RiverbedThe last three months may have been a whirlwind of activity for you. Many organizations are trying to wind down projects, wrap up the spending on Read More 2 Jan 2021Forcepoint.News Welcome to the Unbound EnterpriseUnderstanding the Need for the Unbound Enterprise Unbound Work Requires Unbound Security Getting to unbound depends on a corporate leadership Read More 31 Dec 2020Indeed Identity.News Roundtable: Evolution of Trust. Get ready for PKI 2.0In the digital era, PKI is one of the most effective technologies for authentication of users and devices that is used by worldwide companies for Read More 30 Dec 2020Checkmarx.News Preventing Developer Burnout in the Age of Rapid Software DeliveryThis increased pace and immense pressure surrounding software development have made burnout an even bigger reality than before, at a time when Read More 30 Dec 2020Cofense.News Emotet is Back for the Holidays with Updated TacticsAfter a lull of nearly two months, the Emotet botnet has returned with updated payloads. The changes are likely meant to help Emotet avoid Read More 29 Dec 2020BeyondTrust.News.Webinars 15 Most Popular Cybersecurity Webinars of 2020: BeyondTrust Edition | BeyondTrust15 Most Popular Cybersecurity Webinars of 2020: BeyondTrust Edition | BeyondTrust December 28, 2020 Open You May Also Be Interested In: Our Read More 29 Dec 2020News.Qualys Qualys Security Advisory: SolarWinds / FireEyeQualys Researchers found Millions of devices exposed to vulnerabilities used in the stolen FireEye Red Team tools and SolarWinds Orion by Read More 27 Dec 2020News.Press releases.ThreatQuotient Know More about the Impact of the SolarWinds Breach on your Environment with ThreatQKnow More about the Impact of the SolarWinds Breach on your Environment with ThreatQ ROSS HAMMER With the recent compromise announcement from Read More 27 Dec 2020News.Versasec The Popular vSEC:TOOL K-Series is Now Available in the Microsoft StoreNow available in the Microsoft Store, vSEC:TOOL K-Series Helps Users Evaluate PKI credential rollout plans. Apple started their App Store 12 Read More 26 Dec 2020Forcepoint.News.Webinars Grant Thornton – Insider Threat Q&AQ: As insider threat increases at an alarming rate, it continues to be one of the most challenging problems for organizations to solve. Do you Read More 24 Dec 2020Carbon Black.News Enterprise EDR Expands New Linux Coverage to SUSE, OpenSUSE, Ubuntu, Oracle & Amazon LinuxVMware Carbon Black is pleased to announce an exciting expansion of Linux distribution coverage for Enterprise EDR users on the VMware Carbon Read More 24 Dec 2020Gartner.McAfee.News Finally, True Unified Multi-Vector Data Protection in a Cloud WorldAccording to a report by Gartner earlier in 2020, 88% of organizations have encouraged or required employees to work from home. And a report from Read More 23 Dec 2020Checkmarx.News 2020 Checkmarx Partner Awards – APJ, EMEA & LATAM2020 has been a year like no other and it has certainly demonstrated just how creative, determined, and committed our partners are as they have Read More 23 Dec 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week ending December 18, 2020Cofense solutions enable organizations to identify, analyze and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More 22 Dec 2020BeyondTrust.News Least Privilege Application Management – A Lesson Learned from SolarWinds Orion | BeyondTrustLeast Privilege Application Management – A Lesson Learned from SolarWinds Orion | BeyondTrust December 22, 2020 Open You May Also Be Read More 22 Dec 2020News.Qualys Adobe Flash Player Reaches End of Life on December 31, 2020In July 2017, Adobe announced that Adobe Flash Player will reach “End of Life” (EOL) on Thursday, December 31, 2020. After this date, Adobe Flash Read More 21 Dec 2020McAfee.News 3 Reasons Why Connected Apps are Critical to Enterprise SecurityWhat are Connected Apps? Collaboration platforms such as Office 365 enable teams and end-users to install and connect third-party Read More 20 Dec 2020News.ThreatQuotient Focusing the SOC on Detection and ResponseThreat Intelligence is the Foundation and Lifeblood of the Security Operations Center We all know the security industry mantra: it’s not a Read More 20 Dec 2020FireEye.News Direct Access to Threat Intelligence With Mandiant AdvantageOur customers and partners have been asking for an easier way to stay informed of threat intelligence announcements. To address this need, Read More 20 Dec 2020News.Versasec Interview with DigiCert. What does the future of PKI look like? Why are DigiCert ONE and Versasec vSEC:CMS such a great fit?Date: 2020-12-18Author: Anders Adolfsson, Versasec Technical Consultant Previous << Team Building in the time of Covid Versasec integrates Read More 20 Dec 2020Allied Telesis.News Public Wi-Fi Security Best PracticesThe common experience of public Wi-Fi is usually frustrating and unreliable due to the cumbersome and repetitive authentication process. In Read More 19 Dec 2020Forcepoint.News.Webinars Understanding Negative Workplace Behaviors (and What You Can Do About it)At some point, we all behave in ways that expose organizations to risk. Negative workplace behaviors contribute to organizational risk, as these Read More 19 Dec 2020News.Opentext Navigating business recovery with AIWith the dramatic changes brought on by COVID-19, businesses are having to adapt to remote working, reduced budgets, and Read More 19 Dec 2020Centrify.News Centrify goes 3-for-3 as a PIM Leader in 2020This week, The Forrester Wave™: Privileged Identity Management, Q4 2020 report was published and Centrify was named a Leader among the 10 Read More 18 Dec 2020FireEye.News DebUNCing Attribution: How Mandiant Tracks Uncategorized Threat ActorsMany people are hearing the term UNC for the first time after we published details of a threat group we refer to as UNC2452. “UNC” groups—or Read More 18 Dec 2020News.Riverbed Bandwidth Cost vs. App Performance | Enterprise SD-WAN Trade-Offs | RiverbedSD-WAN makes it easy to incorporate less-costly bandwidth options like Internet Broadband and LTE at remote locations. What are the Read More 18 Dec 2020News.Riverbed Bandwidth Cost vs. App Performance | Enterprise SD-WAN Trade-Offs | RiverbedSD-WAN makes it easy to incorporate less-costly bandwidth options like Internet Broadband and LTE at remote locations. What are the Read More 18 Dec 2020Micro Focus.News INSPIRE 20 Podcast: Putri Realita, DanoneToday, we are sharing one last excellent INSPIRE 20 podcast before our team takes a well-deserved holiday break – and we hope you enjoy the same! Read More 17 Dec 2020Indeed Identity.News Pacific Tech and Indeed Identity announce strategic partnershipPacific Tech and Indeed Identity enter into a partnership that brings together Indeed Identity cutting-edge cybersecurity products and Pacific Read More 17 Dec 2020McAfee.News How OCA Empowers Your XDR JourneyXDR Promise Let’s start with an understanding of XDR. There is a range of XDR definitions but at the end of day there are core desired Read More 16 Dec 202016 Dec 2020Netwrix.News.Vendors Data Security in 2021: Lessons Learned Looking Back and What to Expect Looking ForwardLive Webinar on Thursday, December 17 at 10am GMT/11 am CET. No one has a crystal ball that reveals exactly what data security challenges we’ll Read More 16 Dec 2020FireEye.News Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST BackdoorExecutive Summary We have discovered a global intrusion campaign. We are tracking the actors behind this campaign as UNC2452. FireEye discovered Read More 16 Dec 202016 Dec 2020Group-IB.News.Vendors Egregor ransomware: white paper & webinarRegardless of how big or protected your company may be, ransomware remains a very real threat. Egregor, a ransomware family that appeared just in Read More 16 Dec 2020Checkmarx.News 2021 Software Security Predictions: Our Experts Weigh InNevertheless, with all of the adjustments that took place, the world of cyber attacker vs. cyber defender did not change much, other than the Read More 16 Dec 2020Cofense.News Strategic Analysis: Agent Tesla Expands Targeting and Networking CapabilitiesThreat actors who transition to this version of Agent Tesla gain the capability to target a wider range of stored credentials, including those Read More 15 Dec 2020Forcepoint.News.Webinars Indicators of Behavior (IOBs) – With 2020 VisionQ: How are Indicators of Behavior different than Indicators of Compromise?A: It is important to look at Indicators of Behavior because we, as an Read More 15 Dec 2020BeyondTrust.News Remote Support for Zebra Mobile Devices | BeyondTrustRemote Support for Zebra Mobile Devices | BeyondTrust December 14, 2020 Open You May Also Be Interested In: Our website uses cookies to provide a Read More 15 Dec 2020News.Qualys FireEye Breach Leveraged SolarWinds Orion SoftwareOn December 8, 2020, FireEye disclosed theft of their Red Team assessment tools. FireEye has confirmed the attack leveraged trojanized updates to Read More 14 Dec 2020Gartner.McAfee.News 10 Reasons to Celebrate 20201. January 2020 Gartner Peer Insights VOC Customers’ Choice for CASB Everyone deserves a break after surviving this past year and I Read More 13 Dec 2020News.Press releases.ThreatQuotient The Evolution of Threat Intelligence PlatformsThe Evolution of Threat Intelligence Platforms CYRILLE BADEAU Initially designed to compensate for the heterogeneity and volume of external Read More 12 Dec 2020Forcepoint.News.Webinars Next Week – Hear from Cybersecurity Industry Leaders at Forcepoint Exchange: Futures and InsightsIt’s time to get ahead Forcepoint Exchange: Futures and Insights Join sessions ‘A Necessary Change in the Data Protection Mindset’ and ‘Slackers, Read More 12 Dec 2020News.Opentext OpenText funds 4 million meals this holiday season2020 has been a most challenging year, and food insecurity has dramatically increased over the last year globally. In Canada alone: 2 Million Read More 11 Dec 2020FireEye.News FireEye Shares Details of Recent Cyber Attack, Actions to Protect CommunityFireEye is on the front lines defending companies and critical infrastructure globally from cyber threats. We witness the growing threat Read More 11 Dec 2020Ivanti.News December Patch Tuesday 2020For all of you who have asked for a pause to Patch Tuesday, you did not get exactly what you wanted for Christmas, but close. December Patch Read More 11 Dec 2020Micro Focus.News Amazing Grace Hopper – HAPPY BIRTHDAYWhen a bright, 30-something persuaded the authorities to waive the restrictions on age and weight, and joined the US Navy in 1944, no-one could Read More 10 Dec 2020Carbon Black.News Protect Yourself from Holiday Cyber Threats – Ask the Howlers, Episode 16 HighlightsIn episode 16 of “Ask the Howlers,” host Stacia Tympanick, senior solution engineer, met up with Ryan Hendricks, staff architect and Read More 10 Dec 2020McAfee.News Securing Containers with NIST 800-190 and MVISION CNAPPAs more enterprises adapt to cloud-native architectures and embark on multi-cloud strategies, demands are changing usage patterns, processes, and Read More 9 Dec 2020FireEye.News Unauthorized Access of FireEye Red Team ToolsOverview A highly sophisticated state-sponsored adversary stole FireEye Red Team tools. Because we believe that an adversary possesses these Read More 9 Dec 2020Checkmarx.News Seven Ways We’ve Helped our Partners Transform to Digital Reality During COVIDAmong organizations that experienced a sudden and dramatic interruption to “business as usual” were the many resellers that market software Read More 9 Dec 2020Cofense.News You Must Quarantine! Fake Office 365 Email Leads to CuriosityThe Cofense Phishing Defense Center (PDC) has discovered a recent phishing campaign that has targeted Office 365 users and includes a convincing Read More 8 Dec 2020Forcepoint.News Zero Trust Network Access (ZTNA) Replaces Implicit Trust with Explicit TrustCloud applications were no problem for newly remote workers to get to (which provided a lot of motivation to switch to SaaS apps where possible). Read More 8 Dec 2020BeyondTrust.News Demystifying Azure PIM: What it is, How it Works, What it Doesn’t Do | BeyondTrustDemystifying Azure PIM: What it is, How it Works, What it Doesn’t Do | BeyondTrust December 7, 2020 Open You May Also Be Interested In: Our Read More 7 Dec 2020Micro Focus.News Escape Endless Implementation with Micro Focus Enterprise Service ManagementCompanies are relying on Service Desks more than ever in this pandemic. More employees are working from home and do not have access to their Read More 6 Dec 2020News.Press releases.ThreatQuotient The ThreatQ Platform: Powering the XDR MovementThe ThreatQ Platform: Powering the XDR Movement MARC SOLOMON In my previous blog, I talked about the integration imperative for Extended Read More 6 Dec 2020FireEye.News Protecting Healthcare and Academia Against Cyber ThreatsAs the COVID-19 pandemic continues, cyber threats have worsened for several industries across the globe. Universities with medical and research Read More 6 Dec 2020News.Versasec Versasec at APEX 2020Date: 2020-11-30Author: Joakim Thorén, CEO Previous << Expand WHfB We are excited to be a part of the annual Apica Performance Excellence Read More 5 Dec 2020Forcepoint.News Automated Forcepoint NGFW High Availability with Azure Resource ManagerThis is why Forcepoint developed an Azure Resource Manager template which deploys a redundant stack of Forcepoint Next Generation Firewall Read More 5 Dec 2020News.Opentext The Future of Cyber Resilience—Enfuse On Air 2020The Future of Cyber Resilience – Click Here to View the Keynote OpenText’s 20th annual Enfuse conference—the cybersecurity and Read More 4 Dec 2020News.ThreatMark ThreatMark named in the RegTech100We’re proud to announce that ThreatMark has been included in the RegTech100 for 2021. The 2021 RegTech100 is launched by specialist research firm Read More 4 Dec 2020FireEye.News Informed Decision Making Regardless of the Tools or Controls in UseThe cyber security industry has been its own enemy as each security vendor focuses on their own specific toolset and unique detection algorithm, Read More 4 Dec 2020Micro Focus.News INSPIRE 20 Podcast: Anna Mok, Ascend LeadershipHappy Monday, and welcome back from the Thanksgiving holiday, for all of our US friends that celebrated! We are kicking the week off feeling Read More 3 Dec 2020Carbon Black.News A Look Ahead: 9 Cybersecurity Predictions for 2021Following an unprecedented year, what’s to come for cybersecurity in 2021? The ripple effects of the global pandemic have created a new Read More 3 Dec 2020McAfee.News Think Beyond the Edge: Why SASE is Incomplete Without Endpoint DLPOrganizations have been in the midst of digital transformation projects for years, but this development represented a massive test. Most Read More 3 Dec 2020News.Riverbed Speed CAD File Downloads | Improve CAD Application Performance | RiverbedWhy design professionals at architectural, engineering, construction and related firms struggle with running CAD applications remotely—and how to Read More 2 Dec 2020FireEye.News Using Speakeasy Emulation Framework Programmatically to Unpack MalwareAndrew Davis recently announced the public release of his new Windows emulation framework named Speakeasy. While the introductory blog post Read More 2 Dec 2020Checkmarx.News How Agencies Can Take Advantage of DevSecOps and Automation to Accelerate ATOsTo discuss how agencies can take advantage of DevSecOps, while meeting their ATO and security requirements in the same timely fashion, Checkmarx Read More 2 Dec 2020News.PROFITAP Preventing Network Downtime during Black FridayThe shopping spree starting on Black Friday, rolling over to Cyber Monday is one of the most critical times for Logistics centers, optimized Read More 2 Dec 2020Cofense.News The New Cofense Resource CenterToday, Cofense officially launched its new Resource Center. Formerly known as Community, the new Resource Center features a completely redesigned Read More 1 Dec 2020BeyondTrust.News Is Your Remote Access Strategy Adapted for the New Normal? | BeyondTrustIs Your Remote Access Strategy Adapted for the New Normal? | BeyondTrust November 30, 2020 Open You May Also Be Interested In: Our website uses Read More 1 Dec 202021 Jan 2021I4P.News Noreg – new i4p reselling partnerWe’re delighted to welcome one of the best known IT security integrators on the Hungarian market Noreg as an i4p reselling partner. We’ve Read More 1 Dec 2020News.Qualys Qualys Research Nominated for Pwnie Awards 2020The Qualys Security Advisory team has been nominated for five Pwnie Awards this year in three different categories. In addition to nominations Read More 29 Nov 2020News.Niagara Networks SecOps Blind sighted!?Privacy, both in the physical and online world, is one of the things most people value dearly. With the inevitable shift from physical locations Read More 29 Nov 2020FireEye.News A Look Back and a Look Forward: Cyber Security in 2021With 2020 coming to an end, we’ve released our 2021 cyber security predictions report, videos with our senior leaders and more. I asked Major Read More 28 Nov 2020News.Opentext 10 Reasons to upgrade OpenText Content Suite and Extended ECMReason #1: Cloud Editions In a recent Forrester Consulting Study, it was revealed that 64% of organizations that store all their content Read More 27 Nov 2020News.ThreatMark ThreatMark Recognized in Deloitte’s Top Technology Fast 50 for Central EuropeThreatMark has been included in Deloitte’s 2020 Technology Fast 50 CE – list honoring the most innovative and fastest-growing technology Read More 27 Nov 2020FireEye.News FireEye Options for Symantec CustomersCustomers of Symantec enterprise solutions continue to feel the impact of Broadcom’s acquisition. After Broadcom discontinued Symantec Endpoint Read More 27 Nov 2020Micro Focus.News GreenLight Group’s GITOpS – what is it and why does it matter?What is GITOpS (and why does it matter)? Operations is the lifeblood of every IT department, and for most IT managers it’s also the bane of their Read More 26 Nov 2020Carbon Black.News 3 Ways to Hunt for the ZeroLogon Vulnerability on Your Windows ServersVulnerability assessment and patch management can be painful time-consuming processes. From the Security team looking at vulnerability reports Read More 25 Nov 2020FireEye.News Election Cyber Threats in the Asia-Pacific RegionIn democratic societies, elections are the mechanism for choosing heads of state and policymakers. There are strong incentives for adversary Read More 25 Nov 2020Checkmarx.News Drupal Core: Behind the VulnerabilityThis article covers the technical facets of CVE-2020-13663 that were made public by Checkmarx in June 2020, but whose details were never Read More 25 Nov 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week ending November 20, 2020Cofense solutions enable organizations to identify, analyze and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More 24 Nov 2020News.Titus 7 technologies to help your business with GDPR complianceTeam Titus · Monday, November 23rd, 2020 In today’s global economy, businesses must be compliant with standards established by various Read More 24 Nov 2020BeyondTrust.News How Do the 10 Top Privileged Identity Management (PIM) Vendors Stack Up? See Evaluation & Ranking | BeyondTrustHow Do the 10 Top Privileged Identity Management (PIM) Vendors Stack Up? See Evaluation & Ranking | BeyondTrust November 19, 2020 Open You Read More 23 Nov 2020McAfee.News What Truebill and Other Financial Apps Have in Common With EDRThen I got to thinking about these new apps that I can’t imagine why anyone would need to use – UNTIL I decided to try Read More 22 Nov 2020News.Press releases.ThreatQuotient The Integration Imperative for XDRThe Integration Imperative for XDR MARC SOLOMON In my previous blog, I talked about the need for a conduit between Extended Detection and Read More 22 Nov 2020FireEye.News FireEye is the Intelligent Choice for Symantec ReplacementStop breaches in their tracks Each desktop, laptop and server is a possible entry for a breach, leaving your data, customer information and Read More 21 Nov 2020Forcepoint.News There’s Still Time to Register for Next Week’s SD-WAN and SASE SummitLike other events over the last several months, this year’s Summit has gone fully digital so you can attend no matter where you are based. SD-WAN Read More 21 Nov 2020News.Opentext Why innovation must be the new reality for government IT from January 2021 It’s almost ten years since the failed launch of healthcare.gov. This event served to cruelly expose what Read More 21 Nov 2020Centrify.News Ping and Centrify – Layering Identity Security Into DevOps [Webinar November 18]As has been well documented, security is often not the main focus for DevOps. The restrictions created by traditional methods of securing Read More 20 Nov 2020FireEye.News Purgalicious VBA: Macro Obfuscation With VBA PurgingMalicious Office documents remain a favorite technique for every type of threat actor, from red teamers to FIN groups to APTs. In this blog post, Read More 20 Nov 2020Micro Focus.News Smart changes in storeIntroduction A recent Forbes article commented, “COVID-19 will be remembered for many things and what’s becoming indisputable is how it is Read More 19 Nov 2020cPacket Networks.News cPacket Networks Deepens Cloud Offering with AWS Gateway Load BalancerThe post cPacket Networks Deepens Cloud Offering with AWS Gateway Load Balancer appeared first on cPacket Networks.Read More 19 Nov 2020Carbon Black.News VMware Carbon Black Announces Splunk Integration to Streamline and Modernize SOC WorkflowsIntroducing Unified VMware Carbon Black Cloud App for Splunk At VMware Carbon Black, our ecosystem of integration and alliance partners has Read More 19 Nov 2020Gartner.McAfee.News McAfee MVISION Solutions Meet FedRAMP Cloud Security RequirementsThis FedRAMP Moderate designation is equivalent to DoD Impact Level 2 (IL2) and certifies that the McAfee solution has passed rigorous security Read More 18 Nov 2020FireEye.News Find and Verify Threats in Splunk Phantom With FireEye Detection On DemandThreats can and do come from everywhere, and every organization approaches security differently based on their needs, industry and environment. Read More 18 Nov 2020Checkmarx.News Apache Unomi CVE-2020-13942: RCE Vulnerabilities DiscoveredGiven that Unomi contains an abundance of data and features tight integrations with other systems, making it a highly desired target for Read More 18 Nov 2020News.Riverbed Maximizing Network and Application Visibility and Performance | RiverbedNow as most IT professionals will attest, that’s not an easy thing to do, especially in complex hybrid cloud environments. But that’s where Read More 18 Nov 2020News.Riverbed Maximizing Network and Application Visibility and Performance | RiverbedWhen I joined Riverbed in October 2019, one of my first priorities was to present a clear vision and strategy for the company going into 2020. Read More 18 Nov 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week ending November 13, 2020Cofense solutions enable organizations to identify, analyze, and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More 17 Nov 202021 Jan 2021I4P.News i4p’s participation at RISK 2020It was a pleasure to have participated at REAL security’s RISK conference 2020. This leading IT security event for the Adriatic region went Read More 17 Nov 2020Forcepoint.Gartner.News Forcepoint Recognized by Gartner for 4th Straight Year as a Visionary in Network FirewallsWe designed Forcepoint NGFW to help enterprises and government agencies securely connect their offices, branches, private clouds and other sites Read More 17 Nov 2020BeyondTrust.News Stop Ransomware Attacks like RYUK with a Preventative Endpoint Security Approach | BeyondTrustStop Ransomware Attacks like RYUK with a Preventative Endpoint Security Approach | BeyondTrust November 16, 2020 Open You May Also Be Interested Read More 17 Nov 2020News.Qualys An End-to-End Approach to Next-Gen Web Application and API SecurityIt was almost 10 years ago that Marc Andreessen wrote that software is eating the world. It is still true today, but I would be even more Read More 17 Nov 2020Centrify.News Simplifying Access to Servers Using Tools You Are Familiar WithProviding privileged access to servers can be challenging, given the requirements to both grant access to authorized IT staff as well as protect Read More 16 Nov 2020Gartner.McAfee.News SOCwise: A Security Operation Center (SOC) Resource to BookmarkMeet the SOCwise From Michael Leland, Technical Director of Security Operations, McAfee From the perspective of a ‘legacy SIEM’ guy I Read More 15 Nov 2020News.ThreatQuotient The Term “Threat Intelligence” is Poisoned. It Does Not Mean What You Think it Means.I’m guessing the creators of the movie The Princess Bride had no idea that Inigo Montoya’s quote – You keep Read More 14 Nov 2020Forcepoint.News Future Insights – The Rise of Insider Threat-as-a-ServiceWhen envisioning the threats to your organization, malicious nation states or greedy virtual thieves located halfway around the world might loom Read More 14 Nov 2020News.Opentext 5 Content Suite and Extended ECM highlights from OpenText World 2020OpenText™ World 2020 offered insights from leading experts to help rethink the challenges facing your business. Learn how to best harness Read More 13 Nov 2020FireEye.News A Global Reset: Cyber Security Predictions 2021For most of us, 2020 was one of the most challenging years in recent memory. We struggled to deal with big changes in our personal lives and were Read More 12 Nov 2020Carbon Black.News VMware Carbon Black Named a Finalist in the 2020 CRN Tech Innovator AwardsWe are proud to announce that CRN®, a brand of The Channel Company, has named VMware Carbon Black a finalist in the 2020 CRN Tech Innovator Read More 12 Nov 2020McAfee.News How CASB and EDR Protect Federal Agencies in the Age of Work from HomeMcAfee’s global network of over a billion threat sensors affords its threat researchers the unique advantage of being able to thoroughly Read More 11 Nov 2020Checkmarx.News Checkmarx Solutions Now Available for Purchase on AWS MarketplaceIn case you’re unfamiliar, AWS Marketplace is a curated, digital catalogue that helps customers around the globe find, buy, and use third-party Read More 11 Nov 2020Ivanti.News November Patch Tuesday 2020Microsoft has released updates resolving a total of 112 unique common vulnerabilities and exposures (CVEs) this month. This puts us back up over Read More 11 Nov 2020Cofense.News Variants of Emotet MalwareThe Cofense Phishing Defense Center (PDC) team has seen a resurgence in the number of Emotet variants in the past few months, with the majority Read More 10 Nov 2020BeyondTrust.News Service Accounts – Don’t Overlook this Hidden Privilege Access Risk | BeyondTrustService Accounts – Don’t Overlook this Hidden Privilege Access Risk | BeyondTrust November 9, 2020 Open You May Also Be Interested In: Our Read More 10 Nov 2020News.Qualys The Evolution of the Qualys Cloud PlatformThe global pandemic has upended everything, and in the cyber security world in particular it has highlighted the need for organizations to have a Read More 10 Nov 2020Centrify.News Ephemeral Tokens vs. IDs and Passwords: A Simple Choice for DevOps?Static IDs and passwords have been around for decades, and for all the talk about getting rid of them, big pockets remain. Sure, for human login Read More 8 Nov 2020FireEye.News Ransomware: The Threat We Can No Longer Afford to IgnoreCybercrime is a billion-dollar industry that is consistently evolving. Innovation is at the heart of these criminal acts—hackers and fraudsters Read More 7 Nov 2020Forcepoint.News IDG Study – Protecting the Human Side of CybersecurityEmployees are Remote, Data is Everywhere According to a recent survey conducted in May 2020 by IDG of over 100 IT leaders, one major problem is Read More 7 Nov 2020News.Opentext Boost your digital fitness for cyber resilience in 2020 – and beyondDuring this tumultuous year, digital tools have let us keep working even as we’ve shuttered once-busy office spaces, moved by the millions Read More 7 Nov 2020Centrify.News Externalizing Credential Management for ITOM and ITSMOver the years, a pretty simple causality has emerged that represents one of the most significant security risks for organizations: PRIVILEGED Read More 6 Nov 2020FireEye.News Malicious File Transfer: What You Need To Know About an Attacker’s Methods and Techniques To Protect Your Organization From MalwareOne of the most effective ways for threat actors to infiltrate a network’s defenses is through the use of malware. As I discussed in our Security Read More 6 Nov 2020Micro Focus.News Micro Focus is Strategically Winning!How do we measure how strategic we are to our customers? Micro Focus uses double-blind competitive benchmarking in order to gauge how well we are Read More 5 Nov 2020Carbon Black.News.Webinars Countering a Home Invasion: Modernizing Threat Hunting Best PracticesThe recently released VMware Carbon Black Global Incident Threat Report found that incidents of counter incident response (IR) are occurring in Read More 5 Nov 2020McAfee.News.Webinars SPOTLIGHT: Women in CybersecurityThe RSA Conference USA 2019 held in San Francisco — which is the world’s largest cybersecurity event with more than 40,000 Read More 5 Nov 2020Allied Telesis.News Technology Surges Due to COVID-19Technology in healthcare often refers to cutting-edge treatments, or advanced, top-of-the-line medical devices and procedures. The COVID-19 Read More 4 Nov 2020FireEye.News Live off the Land? How About Bringing Your Own Island? An Overview of UNC1945Through Mandiant investigation of intrusions, the FLARE Advanced Practices team observed a group we track as UNC1945 compromise managed service Read More 4 Nov 2020Checkmarx.News Erez Yalon: A Security Leader in the API EconomyTo spread awareness around API risks and encourage developer secure coding practices when using APIs, Erez Yalon, Checkmarx’s Director of Read More 4 Nov 2020Cofense.News At the User’s Expense: Threat Actors Weaponize Companies’ Employee Reimbursements During the PandemicWith the health crisis that is COVID-19, employees are dutifully working from home. While some already had home offices decked out with dual Read More 3 Nov 2020BeyondTrust.News Top Cybersecurity Trends tor 2021: The Hacking of Time, M/L Data Poisoning, AI Attacks, & More | BeyondTrustTop Cybersecurity Trends tor 2021: The Hacking of Time, M/L Data Poisoning, AI Attacks, & More | BeyondTrust October 27, 2020 Open You May Read More 3 Nov 2020News.Riverbed Network Visibility’s Impact on Performance, Productivity and Security | Federal Government IT Study | RiverbedEvery federal IT manager wants to deliver the best end-user experience for their employees and agency, including a reliable network Read More 2 Nov 2020Gartner.McAfee.News McAfee Named a Leader in the 2020 Gartner Magic Quadrant for CASBCloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and Read More 1 Nov 2020Gartner.News.Press releases.ThreatQuotient From the Trenches, Part 2: Working with Employees to Strengthen Security PostureFrom the Trenches, Part 2: Working with Employees to Strengthen Security Posture Liz Bush During COVID-19 and the shift to a remote work Read More 1 Nov 2020FireEye.News Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening, and ContainmentUPDATE (Oct. 30, 2020): We have updated the report to include additional protection and containment strategies based on front-line visibility and Read More 31 Oct 2020Forcepoint.News Cybercriminals Exploit Brazil’s PIX Instant Payment Platform in New Phishing AttackThe largest campaign we have uncovered, with over 4,000 phishing emails sent (and blocked by Forcepoint Email Security) on 21st October 2020, Read More 31 Oct 2020News.Opentext Join us for OpenText Enfuse On AirEnfuse On Air 2020 is the premier conference focused on prevention, detection and investigation of threats. Every Tuesday between November Read More 30 Oct 2020FireEye.News Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware ChaserThroughout 2020, ransomware activity has become increasingly prolific, relying on an ecosystem of distinct but co-enabling operations to gain Read More 30 Oct 2020Micro Focus.News Plotting your DX strategy in the new normalDX: Get Serious Have you seen the pandemic internet joke? It asks, “Who has driven Digital Transformation the most?” Options A and B are CEO and Read More 29 Oct 2020Carbon Black.News Cybersecurity Awareness Month: 2020 in RetrospectFor cyber defenders worldwide, 2020 has been unprecedented year. CISOs and their security teams have battled increased attack volumes and data Read More 28 Oct 2020FireEye.News Endpoint Security on the Developer HubGreat news: FireEye Endpoint Security is now available on the Developer Hub! Head over to the Developer Hub page now to explore the Endpoint Read More 28 Oct 2020Checkmarx.News Cybersecurity Awareness Month Week 4: Day in the Life, Software DeveloperWe’ve covered a lot of ground, but one area we haven’t hit on quite yet is the developer side of things. In today’s modern DevOps world, Read More 28 Oct 2020Cofense.News Purchase Order Phishing, the Everlasting Phishing TacticThe PDC team has seen a recent up-tick in legitimate Mimecast services being used as a vector for phishing campaigns found in environments Read More 27 Oct 2020News.Titus Budget-squeezed organizations face greater data security risksHow Titus and HelpSystems helps solve your data security needs Team Titus · Thursday, October 22nd, 2020 Organizations are more at risk Read More 27 Oct 2020Forcepoint.News Zero Trust Network Access (ZTNA): The cure for the common VPNVPNs and users don’t mix well That approach had been okay for small numbers of people working outside an office. But when everybody suddenly had Read More 27 Oct 2020BeyondTrust.News IT Security Leaders Share Scary Cybersecurity Tales & Cyberthreat Hobgoblins that Haunt their Sleep | BeyondTrustIT Security Leaders Share Scary Cybersecurity Tales & Cyberthreat Hobgoblins that Haunt their Sleep | BeyondTrust October 23, 2020 Open You Read More 27 Oct 2020News.Qualys NSA Alert: Chinese State-Sponsored Actors Exploit Known VulnerabilitiesOn October 20, 2020, the United States National Security Agency (NSA) released a cybersecurity advisory on Chinese state-sponsored malicious Read More 26 Oct 202026 Oct 2020News.RISK conference RISK 2020 letos v VIRTUALNI obliki!Spoštovani, vljudno vabljeni na največjo konferenco o informacijskim varnosti in novih tehnologijah v regiji Adriatik, RISK 2020, ki bo letos Read More 26 Oct 202026 Oct 2020News.RISK conference RISK 2020 this year in full VIRTUAL format!Dear, You are cordially invited to the largest conference on information security and new technologies in the Adriatic region, RISK 2020, which Read More 26 Oct 2020McAfee.News Data-Centric Security for the Cloud, Zero Trust or Advanced Adaptive Trust?Today, most entities utilize a multi-phased security approach. Most commonly, the foundation (or first step) in the approach is to implement Read More 25 Oct 2020Gartner.News.Press releases.ThreatQuotient Do Your Part to Stay Safe Online and Start Using a Password ManagerDo Your Part to Stay Safe Online and Start Using a Password Manager Aaron Louks Cybersecurity Awareness Month 2020 is about taking proactive Read More 25 Oct 2020FireEye.News Flare-On 7 Challenge SolutionsWe are thrilled to announce the conclusion of the seventh annual Flare-On challenge. This year proved to be the most difficult challenge we’ve Read More 24 Oct 2020Forcepoint.News Everything You Need to Know About the Cyber Voices Zero Trust SummitIf you’re a security leader for your organization, chances are good you’re at some point along a digital transformation journey that’s focused on Read More 24 Oct 2020News.Opentext OpenText World 2020—Are You Ready for the Great Rethink?The world is not changing. It has changed. These changes are deep. Structural. Lasting. We must use this opportunity to rethink on a massive Read More 23 Oct 2020FireEye.News Threats Targeting VoIP Networks as Usage Surges During PandemicInternet service providers are seeing a spike in Voice over Internet Protocol (VoIP) usage driven by the increased adoption of working from home Read More 23 Oct 2020Micro Focus.News INSPIRE 20 – mark my words! The importance of diverse tech innovationUKBlackTech All I can say about this week’s episode is WOW, Mark Martin, what an episode! Mark, a computer science teacher and founder of Read More 22 Oct 2020Carbon Black.News Crossing the Narrow SeaTom Kellermann, Head of Cybersecurity Strategy at VMware and Member of the Cyber Investigations Advisory Board of the United States Secret Read More 22 Oct 2020McAfee.News The Deepfakes Lab: Detecting & Defending Against Deepfakes with Advanced AIDeepfakes began to gain attention when a fake pornography video featuring a “Wonder Woman” actress was released on Reddit in late Read More 21 Oct 2020FireEye.News The Inception of Mandiant AdvantageOur customers expressed a desire for faster access to our intelligence to focus on threat activity that matters to them, so we launched Mandiant Read More 21 Oct 2020Checkmarx.News Cybersecurity Awareness Month Week 3: Day in the Life, AppSec EducatorIn the security industry, enough can’t be said about the need for spreading awareness. It’s the first, and most critical, step in spurring action Read More 21 Oct 2020Cofense.News Mandatory Internal Company Communications: The Best Time to PhishCompanies are awash with numerous corporate communications: open enrollment notifications, new policies and so forth. With this crush of Read More 20 Oct 2020BeyondTrust.News Understanding Authentication vs. Authorization | BeyondTrustUnderstanding Authentication vs. Authorization | BeyondTrust October 19, 2020 Open You May Also Be Interested In: Our website uses cookies to Read More 20 Oct 2020News.Qualys Qualys Policy Compliance Plugin for Jenkins Now AvailableVarious factors may introduce vulnerabilities in a product during its lifecycle, resulting in a drift from the required compliance status. Hence, Read More 19 Oct 2020News.ThreatMark Product Release 3.27 – Improved Bot detection, introduction to async large batch payments scoring, and the new ThreatMark AFS PanelThere’s been a lot of great work done by our team that just gets confined to our own company. Until now, we haven’t communicated out product Read More 19 Oct 2020Certgate Blurtooth Security Issue? AirID is safe!Blurtooth security vulnerability? AirID is safe – Blurtooth has no chance with AirID. Düsseldorf, 21.09.2020, certgate, one of Read More 18 Oct 2020News.ThreatQuotient Is Scaling a Pyramid on Your Bucket List? It Should BeThe concept of “The Pyramid of Pain” was first introduced by David J. Bianco in 2013. Today, most security professionals are familiar Read More 18 Oct 2020FireEye.News Windows Event Streaming Using FireEye Endpoint and HelixGathering Microsoft Windows event logs is a critical function of most SOCs. The wealth of information available on endpoints makes ingesting logs Read More 18 Oct 2020News.Versasec Versasec expands Windows Hello for BusinessDate: 2020-10-12Author: Anders Adolfsson, Versasec Technical Consultant Previous << VISA 1FA EMV In Microsoft Windows 10, Windows Hello for Read More 18 Oct 2020News.Riverbed Enabling Work-From-Anywhere | Application and Network Performance | RiverbedIn Part 1 and Part 2 of this blog series, we established that forward-thinking organizations are prioritizing technology investments to ensure Read More 17 Oct 2020Forcepoint.Gartner.News Future Insights – The Emergence of the Zoom of CybersecurityThis is the status quo today: We have all moved to remote working. Cloud deployment is a necessity. Digital transformation has happened—and where Read More 17 Oct 2020Indeed Identity.News Webinar: 5 coolest features every access management software should haveWhat if you’ve had one tool for managing access of employees and customers? Or a tool providing strong and multi-factor authentication with Read More 17 Oct 2020News.Opentext A little knowledge is a dangerous thing…In today’s world, everything moves so fast. Everyone wants something yesterday. Everyone demands and expects more from Read More 16 Oct 2020FireEye.News FIN11: Widespread Email Campaigns as Precursor for Ransomware and Data TheftMandiant Threat Intelligence recently promoted a threat cluster to a named FIN (or financially motivated) threat group for the first time since Read More 15 Oct 2020Carbon Black.News Ransomware Attacks Targeting Healthcare Surge: VMware Carbon Black experts Weigh inTargeted, sophisticated, and costly – over the past month, several high-profile ransomware attacks have been reported with a specific focus Read More 15 Oct 2020McAfee.News.Webinars “Best of Breed” – CASB/DLP and Rights Management Come TogetherEnter the cloud Most organizations now consider cloud services to be essential in their business. Services like Microsoft 365 (Sharepoint, Read More 14 Oct 2020FireEye.News Threat Found: Integrating With FireEye Detection On DemandThreats can and do come from everywhere, and every organization approaches security differently based on their needs, industry and environment. Read More 14 Oct 2020Checkmarx.News Cybersecurity Awareness Month Week 1: Day in the Life, Security ResearcherHave you ever wondered what a typical day looks like for a security researcher? If so, you’ve come to the right place! We’re kicking things off Read More 14 Oct 2020Cofense.News Security Awareness: Choosing Methods and Content that WorkLast week we examined the importance of setting a strategy and goals for your security awareness program. Part 2 in our 4-part series in support Read More 13 Oct 2020Forcepoint.News Shifting Gears from IOCs to IOBsThe after-the-fact nature of IOCs is one of their clearest limitations. They are documentation artifacts (hash of a file, reputation of an IP, Read More 13 Oct 2020BeyondTrust.News BeyondTrust Expands Cloud Leadership with Password Safe SaaS | BeyondTrustBeyondTrust Expands Cloud Leadership with Password Safe SaaS | BeyondTrust Join Us for Go Beyond – Our Virtual Customer Conference October Read More 11 Oct 2020Gartner.News.Press releases.ThreatQuotient ThreatQuotient Listed in Gartner’s 2020 Market Guide for Security Orchestration, Automation and Response SolutionsThreatQ platform’s data-driven approach to SOAR can free-up two to three full-time security analysts for higher level tasks Reston Va. Read More 11 Oct 2020FireEye.News Mandiant Executive Intelligence Briefing: Election Security EditionWith less than a month before the U.S. elections on Nov. 3, the race is on to protect the democratic process. Mandiant Threat Intelligence is Read More 11 Oct 2020Ivanti.News Coffee Talk With Ivanti Insiders on International Coffee DayName What is your favorite coffee drink? How do you take your coffee? What is your favorite fall/winter coffee drink? Favorite snack to have with Read More 10 Oct 2020Forcepoint.News Five Takeaways to Build a Resilient Cybersecurity Strategy1. Enable remote classified access With people as the new perimeter, cross domain solutions provide remote classified access, while Zero Trust Read More 10 Oct 2020News.Opentext Forrester: What to look for in cloud content management vendors This blog is co-authored by Alison Clarke and Sandi Nelson. Having the right partners by your side is crucial as your organization digitally Read More 9 Oct 2020FireEye.News Gartner: 5 Things You Must Absolutely Get Right for Secure IaaS and PaaSEvery organization is adopting the cloud in one way or another, and for good reason. The cloud offers many benefits, but it also comes with a new Read More 9 Oct 2020Micro Focus.News INSPIRE 20 – the secret diary of a security event crasher….Hacky-sec It’s time for one of my favorite days of the week – INSPIRE 20 podcast day! Today we are joined by the exceptional Tanya Janca, aka Read More 8 Oct 2020Carbon Black.News.Webinars Cybersecurity Awareness Month 2020: Top Resources on “If You Connect it, Protect it”Leaves are turning red and gold, the temperature is dropping, and the smell of pumpkin spice is filling the air. It’s officially October! Read More 8 Oct 2020McAfee.News MITRE ATT&CK for Cloud: Adoption and Value Study by UC Berkeley CLTCBackground Nearly all enterprises and public sector customers we work with have enabled cloud use in their organization, with many seeing a Read More 7 Oct 2020FireEye.News Introducing Mandiant Advantage: Threat Intelligence — Know the Threats That Matter Most To YouWhen it comes to cyber security, many organizations remain reactive. Cyber security becomes a top priority only when a breach occurs, or critical Read More 7 Oct 2020Checkmarx.News Expert Q&A on Securing Code in GitHub with CheckmarxWe sat down with Ken McDonald, Principal Integrations Engineer at Checkmarx, to learn more about how Checkmarx’s new GitHub Action works and how Read More 7 Oct 2020Armis.News 5 Questions CISOs Must Ask When Addressing the New WFH RealityIf you’re like me, your professional life has changed dramatically over the last six months and you’re likely working from home every day. Read More 7 Oct 20207 Oct 2020Armis.News Armis Recognized as a Leader in Connected Medical Device Security EvaluationWe are ecstatic that Armis has been named a Leader in The Forrester New Wave™: Connected Medical Device Security Q2 2020 report. Forrester Read More 7 Oct 2020Cofense.News Twelve Flavors of Phish: Canadian Workers Targeted With Fake Covid-19 Relief DepositsFinancial aid programs continue to be popular targets in the midst of the COVID-19 pandemic, with government relief grants a Read More 6 Oct 2020Forcepoint.Gartner.News Actionable Insights: The Disruption of Behavioral AnalyticsThe Broken Promise of Behavioral Analytics Dynamic User Protection IOB Overview Applied behavioral analytics have fallen short in terms of Read More 6 Oct 2020BeyondTrust.News Why Privilege Management is at the Center of Modern Endpoint Security | BeyondTrust3. Use Pragmatic Application Control & Block Malicious Code [Endpoint Privilege Management] By layering modern application control on top of Read More 6 Oct 2020News.Qualys Instrument VMware Virtual Machines for Security and ComplianceHow do you ensure Qualys is managing the security and compliance of all your VMware workloads? First, you need to have Qualys Cloud Agent Read More 5 Oct 2020McAfee.News McAfee Leapfrogs Competition with trio of awards at 2020 IT World AwardsThe IT World Awards are industry and peer recognitions from Network Products Guide honoring achievements of world’s best in organizational Read More 4 Oct 2020LOGbinder.News Today we revolutionize using Windows Event Collection at scaleWhat we are announcing today with Supercharger for Windows Event Collection reminds me of how far technology has come. I remember being so Read More 4 Oct 2020News.Press releases.ThreatQuotient.Webinars 5 Tips You Can Start Using Today to Reduce Business Risk5 Tips You Can Start Using Today to Reduce Business Risk POSTED BY ANDY GEPERT Cyber threat intelligence (CTI), risk management and privacy teams Read More 4 Oct 2020FireEye.News Back to School: The Cyber Workforce in 2020The cyber skills shortage is a real problem. There just aren’t enough qualified people to adequately meet the cyber security needs of all Read More 3 Oct 2020Forcepoint.News Our Cyber Voices Zero Trust Summit is Just a Few Weeks AwayIf you’re a business leader, a security executive or a security team lead or practitioner, you’ll leave this half-day virtual summit with a Read More 3 Oct 2020News.Opentext Running a resilient EIM platformInformation is key for businesses to operate and succeed, making it imperative that the Enterprise Informant Management platforms they rely on Read More 3 Oct 2020Centrify.News How to Empower the “Sec” in DevSecOpsIn this blog, I’m going to talk about Privileged Access Management (PAM) for security in a modern DevOps world. A very frustrating topic for Read More 3 Oct 2020News.Riverbed Perfect Forward Secrecy (PFS) API and SSL/TLS Analysis | AppResponse 11.10 | RiverbedKeeping track of SSL and TLS security certificates is important. An expired certificate can erode trust in your organization in that customers Read More
27 Dec 2021Micro Focus.News Every Hero Needs a SidekickIn the rush towards digital transformation, even the heroic CIO needs someone they can turn to, says Derek Britton. Who is in your corner to help Read More
25 Dec 2021Forcepoint.News Cashing in on CryptoIf proof were needed, regulators in both the UK and USA have just published guidance on cryptocurrencies for banks and financial institutions. Read More
23 Dec 2021McAfee.News Threat Intelligence and Protections Update Log4Shell CVE-2021-44228CVE-2021-44228 – Apache Releases Log4j Version 2.15.0 to Address Critical RCE Vulnerability Under Exploitation. Threat Summary Read More
21 Dec 2021Forcepoint.News.Webinars Securing the Perimeter of Higher Education – A Fireside Chat with SUNY PlattsburghHigher education institutions of today must practice a delicate balancing act of delivering a high-quality, uninhibited student experience while Read More
21 Dec 2021BeyondTrust.News CVE-2021-44228 or “Log4Shell” is a remote code execution zero-day vulCVE-2021-44228 or “Log4Shell” is a remote code execution zero-day vulnerability in the Apache Log4j2 library, originally disclosed on Read More
21 Dec 2021News.Qualys Qualys Integrates with Shodan to Help Map the External Attack SurfaceQualys CyberSecurity Asset Management (CSAM) now natively integrates with Shodan to enable cybersecurity teams to identify all assets visible on Read More
19 Dec 2021News.Press releases.ThreatQuotient.Webinars Run out of Netflix options? Check out our Most Popular Webinars for 2021Run out of Netflix options? Check out our Most Popular Webinars for 2021 KASEY ELLO We’re fortunate to have a depth and breadth of Read More
18 Dec 2021Forcepoint.News Forcepoint Security News: Log4Shell Vulnerability, Pfizer Trade Secrets Exfiltration, Classifieds Site Leaked Personal Info via the F12 Key, and Hive Ransomware Enters Big LeagueThe recently discovered Log4Shell vulnerability in the popular open source Log4j logging software lets an attacker gain access to a vulnerable Read More
18 Dec 2021News.Riverbed Zoom, Teams, DNS and New TCP Analysis Extract Application and Network Intelligence | Riverbed|AternityWith the vast bulk of the world’s white-collar workforce working from home during the COVID-19 pandemic, there was an explosion in demand for Read More
17 Dec 2021Micro Focus.News Update on Micro Focus Response to “Log4j” VulnerabilityDecember 15, 2021 Updates: Micro Focus is taking immediate action regarding Common Vulnerabilities and Exposures CVE-2021-44228 and Read More
14 Dec 2021Forcepoint.News Cool Heads and Hot WalletsWhy is Cryptocurrency so hot? Rising inflation is devaluing cash reserves by the day, making crypto an ever more attractive investment Read More
14 Dec 2021BeyondTrust.Gartner.News.Webinars Managing Privileged Access across Multicloud IT Environments | BeyondTrustAdmin, superuser, root – different names for the same concept: an account that has total control over a system. In the Windows world, this Read More
14 Dec 2021News.Qualys Developing a Repeatable and Sustainable Security Exploitable Risk Reporting ProgramIntroduction The key to creating a practical Reporting Philosophy is/are well-written vulnerability management policies, standards, and Read More
13 Dec 2021McAfee.News Log4Shell Vulnerability is the Coal in our Stocking for 2021What is it? The vulnerability exists in the way the Java Naming and Directory Interface (JNDI) feature resolves variables. When a JNDI Read More
12 Dec 2021News.Press releases.ThreatQuotient The Threat Model as a CompassThe Threat Model as a Compass ANTHONY STITT The purpose of the Cyber Threat Intelligence (CTI) team is to understand the cyber threat environment Read More
11 Dec 2021Forcepoint.News.Webinars Product Spotlight—Bitglass Platform DLP December 14Because it’s built with familiar policy models, you won’t need to reinvent your approach and policies as you move to the cloud. Bitglass’ Read More
7 Dec 2021News.Titus Take the best-of-breed track to implementing data classificationDownload our infographic The post Take the best-of-breed track to implementing data classification appeared first on Titus. This post was first Read More
7 Dec 2021Forcepoint.News Dr. Andrew Hammond Talks Cyber Espionage, Spy Museum and MoreIndeed, the desire to know what an adversary is doing is hardly a new one. Instead, technology and the role of the intelligence agent have Read More
7 Dec 2021BeyondTrust.News BeyondTrust Launches Cloud Privilege Broker for Control Over Multicloud Permissions & Entitlements | BeyondTrustIt is my pleasure to announce the release of BeyondTrust Cloud Privilege Broker, a new solution built from the ground up to help our customers Read More
5 Dec 2021News.Press releases.ThreatQuotient.Webinars What Does Sun Tzu Have to Do with XDR? More Than You Might Think!What Does Sun Tzu Have to Do with XDR? More Than You Might Think! ANTHONY PERRIDGE Military general and philosopher Sun Tzu once led the largest Read More
4 Dec 2021Forcepoint.News Forcepoint Security News: GoDaddy Breach Widens, Panasonic Confirms Cyberattack, California Pizza Kitchen Serves Up Employee SSNs, and Political CyberattacksGoDaddy Breach Widens, Includes Reseller Subsidiaries Panasonic Confirms Cyberattack and Data Breach California Pizza Kitchen Serves Up Employee Read More
2 Dec 2021McAfee.News The Bug Report – November EditionCVE-2021-20322: Of all the words of mice and men, the saddest are, “it was DNS again.” Your Cybersecurity Comic Relief To Read More
30 Nov 2021Forcepoint.News Product Spotlights: Network Security Session Coming December 7All of these elements have opened a Pandora’s box. A Robert Half survey found that 49% of employees prefer a hybrid work arrangement that Read More
30 Nov 2021News.Qualys It’s a Wrap! QSC 2021 Las Vegas Laid Out Problems, Solutions and InnovationAlthough organizations have made moves toward it for years, digital transformation, in a way, has only just begun. The pandemic may have Read More
29 Nov 2021McAfee.News.Webinars McAfee Enterprise Defender Blog | CISA Alert: MS Exchange & Fortinet VulnerabilitiesThreat Summary On November 17, 2021, The US Cybersecurity & Infrastructure Security Agency (CISA) pushed an Alert entitled “Iranian Read More
28 Nov 2021News.Press releases.ThreatQuotient Integration of the ThreatQ platform into McAfee Enterprise infrastructureIntegration of the ThreatQ platform into McAfee Enterprise infrastructure EUTIMIO FERNANDEZ Proper management of threat data is critical in Read More
27 Nov 2021News.ThreatMark ThreatMark Recognized Top 5 in Deloitte’s 2021 Technology Fast 50 CEThreatMark, provider of the most advanced online fraud prevention solution in the market, has been recognized in the Top 5 Deloitte’s 2021 Read More
25 Nov 2021Gartner.McAfee.News Global Technology Provider Looks to MVISION Unified Cloud EdgeTo better serve its customers and secure its own environments, one global technology provider decided to expand its existing on-premises data Read More
23 Nov 2021BeyondTrust.News.Webinars Multicloud Security & Permissions Management: Practical Tips | BeyondTrustHere is a question to consider: How many cloud solutions does each organization need? If your organization wishes to remain competitive – the Read More
23 Nov 2021News.Qualys Euronet Worldwide: Speedy, Global Response to Threats Reduces RiskAfter years of using manual processes and systems to manage its IT inventory and track vulnerabilities, racking up costs, and increasing the Read More
22 Nov 2021McAfee.News Ransomware Threats Affecting the Public SectorIn June 2021 the G7 economies urged countries that may harbor criminal ransomware groups to take accountability for tracking them down and Read More
21 Nov 2021News.Niagara Networks Resolving the Packet Duplication ChallengesSeamless monitoring of network traffic is critically important for enterprise network and security administrators: it lies at the very foundation Read More
21 Nov 2021Gartner.News.ThreatQuotient Acronyms Aside, the SOC of the Future Needs These 3 CapabilitiesEvery discipline has its acronyms, but I’d venture to say cybersecurity has more than its share. We use them to describe threat actors and Read More
20 Nov 2021Forcepoint.News The Rise of Tractor Hackers and Smart City AttackersBy trying to remove the overhead of humans through automation, food producers and farmers have incidentally built their businesses on an Read More
18 Nov 2021Gartner.McAfee.News Qualities of a Highly Available CloudMVISION UCE, our data-centric, cloud-native Security Service Edge (SSE) security platform, derives its capabilities from McAfee Read More
16 Nov 2021Forcepoint.News SolarWinds CEO Talks Sunburst Attack, SecurityDon’t miss this insightful and inspiring discussion, part of Forcepoint’s To The Point podcast series named to FedTech’s Top 30 Federal IT Read More
16 Nov 2021BeyondTrust.News Proactive PAM Defenses against LightBasin (UNC1945) & other Advanced Attackers | BeyondTrustOn October 19, 2021, CrowdStrike released a detailed analysis of a cyberattack waged on telecommunications companies by a group dubbed LightBasin Read More
16 Nov 2021News.Qualys Microsoft & Adobe Patch Tuesday (November 2021) – Microsoft 55 Vulnerabilities with 6 Critical, 6 Zero-Days. Adobe 4 VulnerabilitiesMicrosoft Patch Tuesday – November 2021 Microsoft patched 55 vulnerabilities in their November 2021 Patch Tuesday release, of which six are rated Read More
15 Nov 2021McAfee.News Veterans Day & Remembrance Day 2021When were you drafted or when did you enlist/join? What branch of the military did you serve and in what rank? Shannon Clancy joined October 5, Read More
15 Nov 2021Micro Focus.News If We Really Want to Drive Change, We Have to Work TogetherThe final INSPIRE 20 podcast looks back at a number of the ways that individuals are promoting inclusion and diversity in their own lives and how Read More
14 Nov 2021News.Press releases.ThreatQuotient ThreatQuotient dévoile ThreatQ v5 : pour soutenir le SOC du futur avec des capacités clés de gestion des donnéesL’approche axée sur les données, l’architecture d’open intégration et l’automatisation Read More
13 Nov 2021Forcepoint.News Security News: U.S. Offers DarkSide Bounty, Nobelium Campaigns Continue, and International Ransomware AttacksU.S. Cracks Down on Ransomware, Offers $10 Million Bounty for DarkSide Info Nobelium, The Hackers Behind SolarWinds Attack, Targets IT Supply Read More
13 Nov 2021News.Opentext An open letter to anyone switching their supply chain integration servicesDear Reader, If you’re here then you are at least marginally associated with some aspect of your company’s Read More
11 Nov 202111 Nov 2021Group-IB.News.Webinars See Your Company Through The Eyes Of The HackerFew corporate breaches actually involve zero-day vulnerabilities or advanced exploits. Instead, those breaches result from ordinary Read More
11 Nov 2021McAfee.News Legendary Entertainment Relies on MVISION CNAPP Across Its Multicloud EnvironmentLegendary Entertainment is a global media company with multiple divisions including film, television, digital studios, and comics. Under the Read More
9 Nov 2021Forcepoint.News Security News: REvil Group Taken Offline by Feds, Attacker Activities and a VPN Company Exposes DataREvil Ransomware Gang Taken Offline (Again) by FBI DarkSide Moves to Cash Out $7m in Bitcoin Acer Confirms Second Cyberattack Within a Week of Read More
9 Nov 2021BeyondTrust.News SSD Advisory – macOS Finder RCE & How Privilege Management for Mac Can Mitigate It | BeyondTrustThe SSD Advisory in macOS Finder RCE, discovered last month by independent security researcher, Park Minchan, underscores the need for having Read More
9 Nov 2021News.Qualys CSPM Evolution – Start Secure, Stay SecureFor the last several years, the Verizon DBIR report has identified misconfigurations, errors that are unintended actions by an internal party, as Read More
7 Nov 2021News.Press releases.ThreatQuotient Cybersecurity Breakthrough Awards Names ThreatQuotient Security Automation Solution of the YearCybersecurity Breakthrough Awards Names ThreatQuotient Security Automation Solution of the Year MARC SOLOMON With thousands of tools and Read More
6 Nov 2021Forcepoint.News Beware the NetSec PretendersAt Forcepoint, that simply isn’t how we do business. We do security. But, if we’ve made such big strides forward, then how is it that cyber Read More
6 Nov 2021News.Opentext A staged approach to achieving clinical data intelligenceIn 1925, inventor Hugo Gernsbacher suggested a remote control device for physicians and called it ‘Teledactyl,’ effectively Read More
4 Nov 2021McAfee.News The Bug Report – October EditionApache server version 2.4.50 (CVE-2021-42013) Your Cyber Security Comic Relief Apache: CVE-2021-41773 and CVE-2021-42013 What is it? 2 CVES / 1 Read More
3 Nov 2021cPacket Networks.News cPacket Networks Extends Cloud Visibility with Microsoft Azure Gateway Load BalancerThe post cPacket Networks Extends Cloud Visibility with Microsoft Azure Gateway Load Balancer appeared first on cPacket Networks.Read More
3 Nov 2021News.Riverbed Hybrid Work Global Survey 2021 | Riverbed | AternityWe get it, hybrid work is important and here to stay. But shifting to a high-performing hybrid work model is challenging and elusive for most Read More
3 Nov 2021News.Riverbed Hybrid Work Global Survey 2021 | Riverbed | AternityHybrid work is the new norm and critical to organizational success—but the question is, are you ready to support the hybrid workplace? To assess Read More
3 Nov 2021Cofense.News Cofense General Counsel and Chief Privacy Officer Shane McGee to Speak At 2021 RSA ConferenceLeesburg, Va. – May 6, 2021 – Cofense, the leading provider of phishing detection and response (PDR) solutions, today announced that the Read More
2 Nov 2021News.Titus Why You Need A Specialist Provider – Getting The Product Support You Need Home » Titus Blog » Why You Need A Specialist Provider – Getting The Product Support You Need Georgina Stockley · Monday, November 1st, Read More
2 Nov 2021BeyondTrust.News 2021 Survey of Evolving Cyber Threats in the Public Sector: Key Takeaways | BeyondTrustPublic sector IT teams are leaning into digital transformation and increasing their reliance on automation (such as robotic processing Read More
2 Nov 2021News.PROFITAP Profitap Supervisor Release NotesWith network growth ever on the rise, it can become more and more difficult to implement, manage, and maintain monitoring equipment such as Read More
2 Nov 2021News.Qualys Apache HTTP Server Path Traversal & Remote Code Execution (CVE-2021-41773 & CVE-2021-42013)On October 4, 2021, Apache HTTP Server Project released Security advisory on a Path traversal and File disclosure vulnerability in Apache HTTP Read More
1 Nov 2021McAfee.News McAfee Enterprise & FireEye 2022 Threat PredictionsRansomware, nation states, social media and the shifting reliance on a remote workforce made headlines in 2021. Bad actors will learn from this Read More
1 Nov 2021Micro Focus.News Micro Focus Post-Sales: SupportedI am Dr. James D. Borderick, and I look after the Competitive Benchmark research for Micro Focus, which I have been doing for over five years. I Read More
31 Oct 2021News.ThreatQuotient 3 Questions for MDRs Helping to Get Your Enterprise to XDRAn XDR implementation can quickly turn into a very large consulting project requiring significant time and budget As cybersecurity professionals Read More
30 Oct 2021Forcepoint.News Cyberattacks: Now Part of the Military ArsenalWhile the U.S. has used cyber strategy for warfare in the past, it can be used against the U.S. too. Stuxnet was an outlier at the time. But we Read More
30 Oct 2021News.Opentext Is empathy drowning in a sea of data?The idea of the family doctor has passed into history. In fact, fewer and fewer Americans have a primary care provider. Yet empathy is, and must Read More
29 Oct 2021Micro Focus.News COP26: Our Actions Today Impact Tomorrow; Take Part in “Count Us In” ProjectThis year’s COP26, the UN Climate Change Conference, is a key event in 2021. As world leaders come together to commit to urgent global climate Read More
28 Oct 2021McAfee.News.Webinars Why an Ounce of Cybersecurity Prevention is Worth a Pound of DetectionAt that point, you’re looking to find out what your adversaries have seen or stolen, you want to plug the holes that enabled the hack and Read More
27 Oct 2021News.ThreatMark ThreatMark attracts additional funding; appoints Daniel Rawlings as new CEO & President to lead the next phase of expansion & growthPrague, Brno, 21st October 2021 – ThreatMark, provider of the most advanced online fraud prevention solution in the market, has completed a new Read More
27 Oct 2021Cofense.News Cybersecurity First – It’s Everyone’s Job!Cybersecurity goes beyond October By Tonia Dudley Start the cybersecurity journey early with your employees or teammates. Work with your human Read More
26 Oct 2021Forcepoint.News Forcepoint Closes Acquisition of BitglassThat’s why I’m excited to announce today Forcepoint completed the acquisition of Security Service Edge (SSE) leader Bitglass. Bitglass helps Read More
26 Oct 2021BeyondTrust.Gartner.News Top 6 Overlooked Identity Security Problems | BeyondTrustTop 6 Overlooked Identity Security Problems | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time in a row. Read More
26 Oct 2021News.Qualys Vulnerability On-Demand Search Reporting & Easy Download optionsVulnerability reporting is different from any other aspect of a Vulnerability Management Program. The methodologies of Discover, Assess, Report Read More
25 Oct 2021Gartner.McAfee.News Realize Your SASE Vision with Security Service Edge and McAfee EnterpriseMany people are excited about Gartner’s Secure Access Service Edge (SASE) framework and the cloud-native convergence of networks and Read More
25 Oct 2021Micro Focus.News How does social responsibility relate to the Net Promoter® Score?Social responsibility is no longer a ‘niche’, instead it touches every industry around the world, including the software industry. It is Read More
24 Oct 2021News.Press releases.ThreatQuotient Interested in a Career in Cybersecurity? These Tips Can Help Guide Your JourneyInterested in a Career in Cybersecurity? These Tips Can Help Guide Your Journey KASEY ELLO With the current global cybersecurity talent shortage Read More
23 Oct 2021Forcepoint.News Product Spotlights: Network Security Session Coming October 26All of these elements have opened a Pandora’s box. A Robert Half survey found that 49% of employees prefer a hybrid work arrangement that Read More
23 Oct 2021News.Opentext Are your citizens paying a time tax?When was the last time you tried to get something done at your local, state or federal government agency? Did you look forward to it? Was it Read More
21 Oct 2021McAfee.News Is There Really Such a Thing as a Low-Paid Ransomware Operator?Lurking in the shadows of every large-scale attack by organized gangs of cybercriminals, however, there can be found a multitude of smaller Read More
20 Oct 2021Cofense.News Cybersecurity Career AwarenessWith the large gap in the cybersecurity workforce, it’s not surprising that the Cybersecurity and Infrastructure Security Agency (CISA) advocated Read More
19 Oct 2021BeyondTrust.Gartner.News Australian & New Zealand Government Reports Highlight the Value of PAM to Disrupt Cyber Attacks | BeyondTrustAustralian & New Zealand Government Reports Highlight the Value of PAM to Disrupt Cyber Attacks | BeyondTrust 2021 Gartner Magic Quadrant Read More
19 Oct 2021News.Qualys Apple fixes zero-day in iOS and iPadOS 15.0.2 emergency release: Detect and Prioritize Vulnerabilities using VMDR for Mobile DevicesApple recently released iOS and iPadOS 15.0.2 as an emergency security update that addresses 1 critical zero-day vulnerabilities, which is Read More
18 Oct 2021Gartner.McAfee.News China Personal Information Protection Law (PIPL): A New Take on GDPR?GDPR is a framework which requires businesses to implement processes to enable them to understand where data is held, how it is used, how long it Read More
18 Oct 2021News.Riverbed Visibility, Actionable Insights and Performance for the Modern, Hybrid Enterprise | RiverbedThis is an exciting week, as we host the Riverbed Global User Conference with thousands from both the Riverbed and Aternity user communities Read More
18 Oct 2021Micro Focus.News Software: Successfully Educated.I am Dr. James D. Borderick, and I look after the Competitive Benchmark research for Micro Focus, which I have been doing for over five years. I Read More
17 Oct 2021News.Press releases.ThreatQuotient.Webinars Curate and Share Threat Intelligence to Accelerate Security OperationsCurate and Share Threat Intelligence to Accelerate Security Operations MIKE SOLOMON AND ROSS HAMMER Over the last several months we’ve seen Read More
17 Oct 2021Indeed Identity.News Indeed PAM 2.6: modern response to potential threatsThe Indeed PAM software suite has been updated to Version 2.6. The release includes a lot of improvements and a number of new features that make Read More
16 Oct 2021Forcepoint.News To Cloud or Not to Cloud? The Case for a Hybrid InfrastructureBut, it’s not all good news. In the process of breaking barriers, security best practices were sometimes sacrificed. As with anything in the Read More
16 Oct 2021News.Opentext #BeCyberSmart: Detect forensically and respond rapidlyOctober is Cyber Awareness Month. To mark this I’m writing about a subject that is close to my heart, a subject I believe is our best Read More
14 Oct 2021McAfee.News 2021 Hispanic Heritage Month Pt. 5: A Celebration of Hispanic Heritage and HopeWhat do you enjoy most about your heritage and what is one of your favorite memories growing up? I love the food and music. To this day I Read More
13 Oct 2021Cofense.News Fight the Phish! Don’t Hesitate to report phishing!With phishing threats still the largest threat leading to a data breach, it’s not surprising that Department of Homeland Security (DHS) / Read More
12 Oct 2021BeyondTrust.Gartner.News ACSC Essential Eight | BeyondTrustACSC Essential Eight | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time in a row. Learn why! Dismiss Read More
12 Oct 2021News.Qualys From Technical Features to Customer Security MetricsQualys solutions are packed with great functionality to deliver operational efficiency to all our customers, but the value does not end with bits Read More
11 Oct 2021Ivanti.News 3Ps of Security: Protect, Prioritize and PatchLike a football or soccer team, security also has two lineups that must be continuously managed. One lineup involves protecting the digital Read More
11 Oct 2021McAfee.News Shaping the Future of CybersecurityI’m incredibly proud to be writing this as the newly appointed CEO of this combined business. Keeping nations and large enterprises safe is Read More
10 Oct 2021News.ThreatQuotient How Integration is Evolving: The X Factor in XDRXDR must be approached as an open architecture where integration is the linchpin Over the past couple of months, I’ve talked about how Read More
9 Oct 2021Forcepoint.Gartner.News Data Security Session Coming October 12As companies begin to open offices post-pandemic, Gartner sites 82% of organizations intend to permit remote working some of the time—even after Read More
9 Oct 2021News.Opentext How to increase billable hours and revenue for your law firmHow much time does the average person spend on their phone? Not surprisingly, a lot. People are spending an average screen time of 5.4 hours on Read More
7 Oct 2021McAfee.News Executive Spotlight: Q&A with Vice President, Global Commercial, Britt NorwoodQ: What’s the first career you dreamed of having as a kid? My first career was as a paper boy from 5th through 8th grade, but I always Read More
6 Oct 2021Cofense.News Be Cyber Smart: Four Steps to Protecting Your Business or HomeAs we kick of Cybersecurity Awareness Month, let’s start with a bit of background before digging into this week’s #BeCyberSmart theme. The Read More
5 Oct 2021Forcepoint.Gartner.News Value of SASE: Mitigate Threats to Data SecurityEnsuring that you can maintain control over such data, whether it’s a spreadsheet that has been downloaded to a laptop or a document stored in Read More
5 Oct 2021BeyondTrust.Gartner.News TrickBot Attack Chain: Deconstructed & Mitigated | BeyondTrustTrickBot Attack Chain: Deconstructed & Mitigated | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time Read More
5 Oct 2021News.Qualys QID Spotlight: Discover Azul Java VulnerabilitiesThe Qualys vulnerability signatures team has released a new series of signatures (detections) for Azul Java, allowing security teams to identify Read More
3 Oct 2021News.ThreatQuotient ThreatQuotient Publishes Research Report: State of Cyber Security Automation Adoption in 2021Report highlights trends and challenges of automating IT security systems and how CISOs and senior security professionals are planning to Read More
3 Oct 2021News.Riverbed Improved Alerting | NetIM Infrastructure Monitoring | RiverbedIf I had to pick one theme for the Riverbed NetIM infrastructure monitoring release (version 2.4), it would have to be new and improved alerting. Read More
2 Oct 2021Forcepoint.News Forcepoint Product Spotlights: Sessions to help secure your perimeter, secure your dataRegister for a Forcepoint Product Spotlight At Forcepoint, our goal is to arm our customers with technology that enables a hybrid workforce to be Read More
2 Oct 2021News.PROFITAP Profitap Showcases Network Monitoring Solutions at GITEX’21 in DubaiThe GITEX Technology Week (October 17-21, 2021, in Dubai, United Arab Emirates) is the biggest tech show in the Middle East, North Africa & Read More
2 Oct 2021News.Opentext National Day for Truth & ReconciliationReconciliation is not a noun. It is not an event. It’s a verb. – Roberta Jamieson Today we honor the lost children and Survivors of Read More
1 Oct 2021Indeed Identity.News Building Mindset for Privileged Account ManagementFor most companies PAM is something that is associated with creating borders or limitations. Often organizations are forced to implement PAM due Read More
1 Oct 2021Micro Focus.News Volunteering to Make Positive Impacts: My Volunteering StoryAs dozens of Micro Focus employees take time out to volunteer at their local foodbanks to support our charity partner Feeding America’s Hunger Read More
30 Sep 2021Gartner.McAfee.News The Art of Ruthless Prioritization and Why it Matters for SecOpsOne of the important goals of SecOps is a faster and more effective collaboration among all personnel involved with security. The team seeks to Read More
29 Sep 2021Cofense.News Three is the Magic NumberWhen it comes to prioritizing or recalling information, three is the magic number. Many of us know this thanks to Schoolhouse Rock with the Read More
28 Sep 2021BeyondTrust.Gartner.News Privileged Password Management in a Zero Trust Environment | BeyondTrustPrivileged Password Management in a Zero Trust Environment | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third Read More
28 Sep 2021News.Qualys Prioritize Remediation with a Perceived-Risk Approach to Strengthen CyberSecurity EffectivenessMinimizing Time To Remediate (TTR) is becoming one of the key metrics of security program effectiveness. This holistic measure represents many Read More
27 Sep 2021McAfee.News Detecting Credential Stealing Attacks Through Active In-Network DefensePost initial compromise, to be able to execute meaningful attacks, attackers would need to steal credentials to move laterally inside the Read More
26 Sep 2021News.Press releases.ThreatQuotient ThreatQuotient Continues Tradition of Celebrating World Rhino Day in 2021Rhino conservation efforts remain an important mission for the Reston, Va. based cybersecurity company Reston, Va. – Sept. 22, 2021 – Read More
25 Sep 2021Forcepoint.News How Two Fortune 150 Companies Save Millions With ForcepointApart from the obvious advantages of protecting the brand’s reputation and avoiding financial penalties by defending against security threats, Read More
25 Sep 2021News.Opentext Enabling highly personalized content at scale with customer dataFor content marketers, finding out that the campaign you worked so hard on didn’t hit the spot is incredibly frustrating. It’s even Read More
24 Sep 2021Micro Focus.News “Staying Current” is Not Just a Fashion StatementKeeping up with the latest fashion trends can be an uncomfortable and costly exercise. Having mistakenly perceived the wisdom of flared trousers, Read More
23 Sep 2021McAfee.News McAfee Enterprise Defender Blog | OMIGOD Vulnerability Opening the Door to Mirai BotnetThis month Microsoft released patches for 86 vulnerabilities. While many of these vulnerabilities are important and should be patched as soon as Read More
22 Sep 2021Cofense.News Phishing as a Ransomware PrecursorFor what seems like years now, ransomware has captured headlines due to its sensationally disruptive and costly nature. And over these years, Read More
21 Sep 2021BeyondTrust.Gartner.News Remote Access Control Strategies for the Work-from-Anywhere (WFA) Era | BeyondTrustRemote Access Control Strategies for the Work-from-Anywhere (WFA) Era | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader Read More
21 Sep 2021News.Qualys Improving Cybersecurity Practices by Managing the Asset LifecycleSecuring enterprise environments continues to increase in importance. Attacks on infrastructure continue to increase and organizations need to Read More
20 Sep 2021McAfee.News The Bug Report | September 2021: CVE-2021-40444There’s a lot of information out there on critical vulnerabilities; this short bug report contains an overview of what we believe to be the Read More
19 Sep 2021Gartner.News.ThreatQuotient How Threat Response is EvolvingAs adversaries changed their view of an attack to include vectors across an organization, defenders have had to evolve their approach as well. Read More
18 Sep 2021Forcepoint.News Value of SASE: Secure Data in the CloudTo mitigate this risk, many businesses and government agencies began shifting to cloud-based security to replace the on-premises solutions. In Read More
18 Sep 2021News.Opentext Innovating with your customersFrom healthcare to supply chains to cyber security, the global pandemic has fundamentally changed how we live and work. Although digital Read More
16 Sep 2021McAfee.News Executive Spotlight: Q&A with SVP of Global Channels, Kathleen CurryQ: Who has been the most influential person in your life? My father instilled in me, from as far back as I can remember, that I can do whatever I Read More
14 Sep 2021Forcepoint.News Network Security: The Invisible DefenderThe shift to remote work and the increasing complexity of the technology landscape – with most organizations now running hybrid infrastructures Read More
14 Sep 2021BeyondTrust.Gartner.News How Well do Windows 10 Security Features Protect against Ransomware? | BeyondTrustHow Well do Windows 10 Security Features Protect against Ransomware? | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for Read More
13 Sep 2021McAfee.News How to Talk to Your Grandparents About CybersecurityWith Grandparent’s Day right around the corner, here’s a guide on how you can help keep your grandparents safe from the Read More
12 Sep 2021News.Press releases.ThreatQuotient Leveraging MISP and TheHive When You Create Your CTI PracticeLeveraging MISP and TheHive When You Create Your CTI Practice CYRILLE BADEAU Many CISOs I speak with across Europe tell me their cybersecurity Read More
12 Sep 2021News.Versasec Our newest hires expand our R&D and Tech Support groupsDate: 2021-09-10Author: Yvonne Moebius, Human Resources Previous << vSECCMS61 Changing Credential Template on Already Issued Credentials Read More
11 Sep 2021Forcepoint.News The Digital Journey for Our Customers and Partners Just Got BetterHere’s what you told us: I’m excited to share enhancements made to our Forcepoint Customer Hub that directly resulted from our community’s input. Read More
11 Sep 2021Ivanti.News Fighting Ransomware: Using Ivanti’s Platform to Build a Resilient Zero Trust Security Defense – Part 2Within the initial blog in this series, we discussed ransomware attacks and their remediation on Android mobile devices. Part 2 addresses Read More
11 Sep 2021News.Opentext Three MDR strategies for government CISOs to quickly detect and respond to threatsThe US President’s Cybersecurity Executive Order, released in May 2021, outlines “the persistent and increasingly sophisticated Read More
9 Sep 2021McAfee.News Executive Spotlight: Q&A with Chief Public Policy Officer, Tom GannQ: What is one event in your life that made you who you are today? Teaching tennis. I know that teaching tennis is not an event, it’s a Read More
7 Sep 2021BeyondTrust.Gartner.News BeyondTrust Celebrates “Summer of Pride”, Culminating with BeyondDiversity 2021 Summit | BeyondTrustBeyondTrust Celebrates “Summer of Pride”, Culminating with BeyondDiversity 2021 Summit | BeyondTrust 2021 Gartner Magic Quadrant names Read More
6 Sep 2021McAfee.News Executive Spotlight: Q&A with EMEA Senior Vice President, Adam PhilpottQ: Do you have a role model? If so, who is it? Well, there are work and there are more personal role models. At work, I have several past and Read More
5 Sep 2021News.Press releases.ThreatQuotient Learn Why Frost & Sullivan Names ThreatQuotient the XDR Competitive Strategy LeaderLearn Why Frost & Sullivan Names ThreatQuotient the XDR Competitive Strategy Leader MARC SOLOMON Extended Detection and Response (XDR) is the Read More
5 Sep 2021News.Versasec Adolfsson Named Global Product Manager for vSEC:CMSDate: 2021-09-02Author: Yvonne Moebius, Human Resources Previous << PKI Cybersecurity on rise in ASEAN During his nearly five years with Read More
4 Sep 2021News.Opentext AWS for Health and OpenText for Healthcare – Better togetherEarlier this month Amazon Web Services introduced AWS for Health, an offering of curated AWS services and AWS Partner Network solutions used by Read More
3 Sep 2021Micro Focus.News Ensure Customers Receive Return on their Software Investment by being Socially ResponsibleIn our recent work, we have demonstrated the importance of social responsibility and environmentalism for business and have shown how brands are Read More
2 Sep 2021News.PROFITAP Network blind spots: TAPs vs SPAN portsNetwork blind spots could be compared to a slow gas leak. They are hidden areas of the network that negatively impact the network’s Read More
2 Sep 2021Gartner.McAfee.News.Webinars SASE, Cloud Threats and MITREAs a quick refresher, the MITRE Att&CK Matrix represents the relationship between attacker Tactics and Techniques: As you know, McAfee Read More
1 Sep 2021Cofense.News Mobile Messaging Service Abused for PhishingUsing Cofense Vision, analysts at the Cofense Phishing Defense Center (PDC) were able to drill down into the targeting patterns of one phishing Read More
31 Aug 2021Forcepoint.Gartner.News.Webinars Value of SASE: Separating Product from PhilosophySASE isn’t a single product; it’s an architecture or philosophy, according to Gartner analyst Nat Smith. Many vendors now offer bundled solutions Read More
31 Aug 2021BeyondTrust.Gartner.News Good User Experience Leads to Good Security | BeyondTrustGood User Experience Leads to Good Security | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time in a row. Read More
29 Aug 2021Gartner.News.ThreatQuotient How Threat Detection is EvolvingAs adversaries have shifted the focus of attacks to achieve their goals, defenders must evolve their approach to threat detection The threat Read More
29 Aug 2021News.Versasec User Self-Service with vSEC:CMS is Easier than EverDate: 2021-08-24Author: Joerg Dettmann, CTO Previous << Cybercrime is global and so is MFA With every new version of our flagship identity Read More
28 Aug 2021News.Opentext What’s new in OpenText Gupta SQLBase 12.3OpenText™ Gupta SQLBase 12.3 increases access security, provides the tools to comply with data protection regulations like GDPR. The query Read More
26 Aug 2021McAfee.News McAfee Enterprise ATR Uncovers Vulnerabilities in Globally Used B. Braun Infusion PumpCVE-2021-33886 – Use of Externally-Controlled Format String (CVSS 7.7) CVE-2021-33885 – Insufficient Verification of Data Read More
24 Aug 2021News.Titus Why India has Introduced the New Personal Data Protection BillHome » Titus Blog » Why India has Introduced the New Personal Data Protection Bill Maheswaran Shanmugasundaram · Friday, August 20th, Read More
24 Aug 2021BeyondTrust.Gartner.News.Webinars DevOps Security Lessons | BeyondTrustDevOps Security Lessons | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the third time in a row. Learn why! Dismiss Read More
22 Aug 2021News.Press releases.ThreatQuotient Defence Engineering and Threat Intel – No Stone Left UnturnedDefence Engineering and Threat Intel – No Stone Left Unturned ANTHONY STITT Every breach starts as a compromise that goes unnoticed and Read More
22 Aug 2021News.Versasec Multi-factor authentication is the easiest way to prevent breachesDate: 2021-08-17Author: Chin Jien Lau, Technical Consultant Previous << Hardware Based PKI Webinar The biggest headline-grabbing Read More
21 Aug 2021Forcepoint.News.Webinars SASE’s Role in Retail and HospitalityThat’s where Secure Access Service Edge (SASE) architecture comes in. How can highly distributed organizations, especially ones in which 24/7 Read More
21 Aug 2021News.Opentext.Press releases Learn all about developer services in 15 minutesDevelopers can find it hard to gain insightful and practical knowledge about developer services. Reading lengthy, business-oriented documentation Read More
20 Aug 2021Micro Focus.News Micro Focus Supports Canada’s First Sustainable IT PledgeThe importance of us all taking action to protect the environment has never been greater, which is why Micro Focus is proud to sign the CIO Read More
19 Aug 2021cPacket Networks.News August 2021 NewsletterThe post August 2021 Newsletter appeared first on cPacket Networks.Read More
18 Aug 2021News.Riverbed Supply Chain Attacks | Identify Indicators of compromise | RiverbedConsider a soft drinks manufacturer. If a competitor wanted to damage its market shares, rather than targeting the bottling plant, it would be Read More
17 Aug 2021BeyondTrust.Gartner.News What is System for Cross-domain Identity Management (SCIM) & What are the Benefits? | BeyondTrustWhat is System for Cross-domain Identity Management (SCIM) & What are the Benefits? | BeyondTrust 2021 Gartner Magic Quadrant names Read More
17 Aug 2021News.Qualys Google Android August 2021 Security Patch Vulnerabilities: Discover and Take Remote Response Action Using VMDR for Mobile DevicesThe recently released Android Security Bulletin for August 2021 addresses 36 vulnerabilities, out of which 5 are rated as critical Read More
15 Aug 2021Gartner.News.Press releases.ThreatQuotient Are You Prepared to Better Protect Against SANS’ Top Attacks and Threats?Are You Prepared to Better Protect Against SANS’ Top Attacks and Threats? ANDY GEPERT The SANS 2021 Top New Attacks and Threat Report is Read More
15 Aug 2021News.Versasec Hardware-based PKI is on the rise in ASEAN: Learn whyCompany Blog Our blog addresses the latest security trends and stories. The posts discuss how identity and access management are playing a larger Read More
14 Aug 2021Forcepoint.News “Tiny Crimes” – the WFH behaviors that invite cyber risk (Australian Survey)Here’s a condensed version of the conversation: Dr Margaret Cunningham, Principal Research Scientist at Forcepoint, and Nick Savvides, Read More
14 Aug 2021News.Opentext Get business content management up and running fast with no IT supportThorsten Fischer leads the Product Management team responsible for the OpenText next-generation SaaS content services Read More
12 Aug 2021McAfee.News Data Centric Zero Trust for Federal Government CybersecurityWhereas the DoD architecture establishes control planes that each have their own decision point, with data given its own decision point, NIST Read More
11 Aug 2021Ivanti.News August Patch Tuesday 2021August Patch Tuesday is much lighter than the past few months. A total of 44 vulnerabilities were resolved by Microsoft, seven of which are rated Read More
10 Aug 2021Forcepoint.News Bringing Government-Strength Data Protection to a Commercial Operational EnvironmentYou can read more about cross-domain solutions and Forcepoint Data Guard in part one of our blog series. However, in today’s integrated digital Read More
10 Aug 2021BeyondTrust.News KuppingerCole Executive Review of Endpoint Privilege Management & the BeyondTrust Solution | BeyondTrustRisks of Digital Transformation The coronavirus pandemic sparked a renewed push for digital transformation, so organizations could adapt, become Read More
10 Aug 2021News.Qualys Tenacity – An Adversary Emulation Tool for PersistencePersistence is one of the more sought-after techniques of an attacker or adversary. Persistence is achieved through a set of tactics or Read More
9 Aug 2021McAfee.News White House Executive Order – Improving Detection of Cybersecurity VulnerabilitiesBetween the initial publication of the Executive Order (EO) for Improving the Nation’s Cybersecurity on May 12 and late July, a flurry of Read More
9 Aug 2021Micro Focus.News Why is Software Education so Important?Education. This is not normally a touchpoint along the customer journey that most people think of when describing the main interaction points Read More
8 Aug 2021News.ThreatQuotient Security is a Big Data Problem, and It’s Getting BiggerSolving security’s big data problem is about prioritized data flow, continuously processing data for analysis and translating and exporting Read More
8 Aug 2021News.Versasec PKI & MFA: What you need to knowDate: 2021-08-02Author: Carolina Martinez, GM Americas Previous << MFA Welcome to the second installment in our Summer Series of video Read More
7 Aug 2021Forcepoint.News New Approaches for ‘Air Gapped’ IT and OT Environments for Critical InfrastructureIn this new world of interconnected systems, critical infrastructure organizations benefit from a multitude of Internet of Things devices with Read More
7 Aug 2021News.Opentext OpenText’s 2021 Corporate Citizenship ReportThese past 18 months have made it clear that companies have an opportunity to create positive change, not just for employees and customers, but Read More
5 Aug 2021McAfee.News New Company, Same Commitment: Channel FirstAs we start this chapter as a pure-play enterprise security company, my focus is on adding value for our partners at all levels, ensuring our Read More
3 Aug 2021News.Titus Enterprise Data Classification: Why you need best-of-breed data classificationHome » Titus Blog » Enterprise Data Classification: Why you need best-of-breed data classification Georgina Stockley · Wednesday, July Read More
3 Aug 2021Forcepoint.News Transforming the Science of Security with Human FactorsMy colleague Dr. Calvin Nobles, department chair and associate professor of information and management at the Illinois Tech College of Computing, Read More
3 Aug 2021BeyondTrust.Gartner.News The Seven Perils of Privilege: How Exactly Can You Avoid Them? | BeyondTrust The Seven Perils of Privilege: How Exactly Can You Avoid Them? | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the Read More
3 Aug 2021News.Qualys Qualys Research Nominated for Pwnie Awards 2021The Qualys Research team has been nominated for five Pwnie Awards this year in three different categories. In addition to nominations for Best Read More
2 Aug 2021News.PROFITAP Introducing XX-12800G Network Packet BrokerProfitap recently announced the release of XX-12800G, the new high-density Network Packet Broker, bringing the power and flexibility of network Read More
2 Aug 2021McAfee.News Introducing MVISION Cloud Firewall – Delivering Protection Across All Ports and ProtocolsWherever networks went, firewalls followed For a long time, firewalls and computer networks were like conjoined twins. Businesses simply could Read More
1 Aug 2021Gartner.News.Press releases.ThreatQuotient How to Assess and Up-level Your Organization’s Maturity for SOAR, Gartner’s TakeHow to Assess and Up-level Your Organization’s Maturity for SOAR, Gartner’s Take MARC SOLOMON Earlier this year, Gartner published Read More
1 Aug 2021News.Versasec Passwords Do NOT Cut it: Why MFA is Critical TodayDate: 2021-07-28Author: Carolina Martinez, GM Americas Previous << Versasec Registers With FSQS NL It’s time for summer school Read More
31 Jul 2021Forcepoint.News Forcepoint NGFW MITRE ATT&CK simulationIn this scenario, an admin researches an issue, finds a potential solution on a forum. The solution provides a download link to PuTTY. Read More
31 Jul 2021Indeed Identity.News Indeed PAM 2.5: user experience is a key to resilient cybersecurityIndeed Identity presents a new version of Indeed Privileged Access Manager. Indeed PAM 2.5 offers enhanced access policy mechanisms, new features Read More
31 Jul 2021News.Opentext What’s new in OpenText Internet of Things PlatformThe latest announcement by OpenText of Cloud Editions includes some great updates to OpenText Internet of Things Platform. Check out the latest Read More
28 Jul 2021Cofense.News Reporting Matters – even for a Smishing MessageWith the increased use of mobile devices to manage so much of our lives, it’s no surprise scammers have moved to this medium to target your Read More
27 Jul 2021News.ThreatMark ThreatMark recognized as a Representative Vendor in 2021 Gartner Market Guide for Online Fraud DetectionWe are excited to announce that ThreatMark, a developer and provider of advanced fraud prevention solutions, was listed as a Representative Read More
27 Jul 2021Forcepoint.News EO 14028 is “right on time,” but challenges remain in race to develop softwareThe Cybersecurity Executive Order dictated publishing guidance outlining security measures for critical software, on Day 60 (see highlighted Read More
27 Jul 2021BeyondTrust.Gartner.News Should Your Organization Consolidate Its Service Desk Tools? | BeyondTrustShould Your Organization Consolidate Its Service Desk Tools? | BeyondTrust 2021 Gartner Magic Quadrant names BeyondTrust a PAM Leader for the Read More
27 Jul 2021News.Qualys Protect your Devices from Pegasus Spyware using VMDR for Mobile Devices’ Proactive ApproachPegasus spyware is in the news, and it has been used to target devices of critical people from different sectors and countries including Read More
25 Jul 2021Gartner.News.Press releases.ThreatQuotient Are You Prepared for the Surge in Ransomware?Are You Prepared for the Surge in Ransomware? ANTHONY STITT Incidents of ransomware have been increasing and evolving steadily for years as Read More
25 Jul 2021News.Versasec vSEC:CMS S6.1 announced by Joerg Dettmann, Versasec Founder and CTODate: 2021-07-21Author: Jörg Dettmann, Founder and CTO Previous << FIDO It’s a big week for our technical team and the entire company as we Read More
24 Jul 2021Forcepoint.News Can Cybersecurity Be Robust Without Being Rigid?Decisions around cybersecurity can be stressful, if not plain scary. The stakes are always high, and it seems like there’s a headline related to Read More
24 Jul 2021News.Opentext Using first-party data to deliver personalized and tailored digital experiences at scaleDelivering personalized digital experiences is getting harder even as the technology to do so gets better. As the value of third-party data is Read More
21 Jul 2021Cofense.News Cofense Delivers Industry’s First Cloud-Native Email Security for Microsoft 365 and Google Workspace – Deployable in Less than a MinuteCofense Protect MSP pairs Computer Vision (a field of artificial intelligence) that simulates how humans see, with Cofense PhishMe’s real-world Read More
20 Jul 2021News.Titus U.S. Data Privacy Gains MomentumAdam Strange · Wednesday, July 14th, 2021 As more and more social and economic activities move online, the importance of privacy and data Read More
20 Jul 2021Forcepoint.News.Webinars Boards of Directors: Cyber Risk is the Cost of Doing BusinessPrinciples for Board Governance of Cyber Risk (Report) And this absolutely raises the stakes for Boards of Directors and the critical role they Read More
20 Jul 2021BeyondTrust.News Endpoint Security vs. Network Security – Revisited | BeyondTrustEndpoint Security vs. Network Security – Revisited | BeyondTrust July 19, 2021 Open You May Also Be Interested In: Our website uses cookies Read More
20 Jul 2021News.Qualys Google Android July 2021 Security Patch Vulnerabilities: Discover and Take Remote Response Action Using VMDR for Mobile DevicesThe recently released Android Security Bulletin for July 2021 addresses 44 vulnerabilities, out of which 7 are rated as critical vulnerabilities. Read More
19 Jul 2021cPacket Networks.News cPacket Networks Accelerates Growth with New Headquarters, Expands Facilities and Its Global FootprintThe post cPacket Networks Accelerates Growth with New Headquarters, Expands Facilities and Its Global Footprint appeared first on cPacket Networks.Read More
19 Jul 2021McAfee.News White House Executive Order – Removing Barriers to Sharing Threat InformationElimination of contractual barriers that limit sharing across agencies through FAR modifications The expansion of log retention Mandatory Read More
18 Jul 2021Gartner.News.ThreatQuotient Three Approaches to an XDR ArchitectureExtended Detection and Response (XDR) can be confusing based on so many different definitions and approaches In 2020, Extended Detection and Read More
18 Jul 2021News.Versasec Versasec Joins FIDO AllianceDate: 2021-07-13Author: Jörg Dettmann, CTO Previous << Cybersecurity Denial and Cure This week, we announced we’re now members of the FIDO Read More
17 Jul 2021Forcepoint.News Forcepoint’s Deep Secure Acquisition Shapes the Future of Malware Protection within Cross Domain Solutions and Data-first SASECDR protects enterprises by deconstructing and disarming commonly used files, including MS Office, PDFs , images, etc, and rebuilding them to Read More
17 Jul 2021Indeed Identity.News Video: “PAM is a key driver to have a compliant and secure environment”The growing importance of implementing privileged access management at the corporate level is noted by leading cybersecurity analytics. They Read More
17 Jul 2021News.Opentext Why 91% of enterprises are looking for new integration solutionsEarlier this year, OpenText and IDG surveyed enterprises with more than 1,000 employees on ERP integration, including insights on their current Read More
14 Jul 2021Cofense.News The Difference Between an Attempted Attack and a Widespread Ransomware Attack is Employee ReportingThe recent Kaseya attack, in which threat actors leveraged a zero-day vulnerability over the holiday weekend, demonstrates that ransomware is Read More
13 Jul 2021News.Titus Heads up! New Canadian Data Privacy Act is Around the CornerThe time to prepare to meet soon-to-be-enacted Canadian data privacy regulations is now. Around the world, the awareness of the need to protect Read More
13 Jul 2021Forcepoint.Gartner.News Transforming from “Zero” to “Hero” with Data-first SASEMany organizations are replacing the short-term workarounds implemented during the pandemic to keep people safe, yet productive. Today, Read More
13 Jul 2021BeyondTrust.News BeyondTrust Introduces ServiceNow Integration with Privilege Management for Windows & Mac | BeyondTrustBeyondTrust Introduces ServiceNow Integration with Privilege Management for Windows & Mac | BeyondTrust July 7, 2021 Open You May Also Be Read More
13 Jul 2021News.Qualys Qualys API Best Practices: Host List Detection APIHost List Detection is your subscription’s list of hosts and their corresponding up-to-date detections including: Confirmed Vulnerability Read More
12 Jul 2021McAfee.News Adding Security to Smartsheet with McAfee CASB ConnectIn June 2021, McAfee MVISION Cloud released support for Smartsheet – providing cornerstone CASB services to Smartsheet through the CASB Read More
11 Jul 2021News.Press releases.ThreatQuotient.Webinars 5 Tips to Improve Threat Report Analysis and Action5 Tips to Improve Threat Report Analysis and Action LIZ BUSH Most organizations have more threat intelligence than they know what to do with, Read More
11 Jul 2021News.Versasec Cybersecurity Denial and its Common Sense CureCompany Blog Our blog addresses the latest security trends and stories. The posts discuss how identity and access management are playing a larger Read More
11 Jul 2021Ivanti.News Apple WWDC 2021Apple’s Worldwide Developers Conference is a week of amazing sessions that define the coming year, announce new features, and preview Read More
10 Jul 2021News.Opentext Why effective asset visibility starts at the digital twinThe cost of poor asset visibility is potentially enormous. Estimates suggest companies are losing almost $25 billion each year in the UK alone. Read More
8 Jul 2021Gartner.McAfee.News The Industry Applauds MVISION XDR – Turning Raves into BenefitsExtended Detection and Response products, better known as XDR, not only extended the capabilities of EDR platforms, but according to Gartner[1] Read More
6 Jul 2021BeyondTrust.News Privileged Access Management for DevOps – BeyondTrust Stands out as a Leader in KuppingerCole Report | BeyondTrustPrivileged Access Management for DevOps – BeyondTrust Stands out as a Leader in KuppingerCole Report | BeyondTrust June 30, 2021 Open You May Read More
4 Jul 2021News.ThreatQuotient How to infuse agility into security operationsFor many years, security professionals have talked about the OODA loop. Devised by Colonel John Boyd, it describes a decision-making cycle that Read More
3 Jul 2021Forcepoint.News Forcepoint CASB Helps Global Customers Safely Adapt to Hybrid Workplace ChangesCompanies are increasingly turning to cloud services to ensure their employees have access to important business data and resources from anywhere Read More
3 Jul 2021Forcepoint.News Forcepoint CASB Helps Global Customers Safely Adapt to Hybrid Workplace ChangesCompanies are increasingly turning to cloud services to ensure their employees have access to important business data and resources from anywhere Read More
3 Jul 2021News.Opentext OpenText employee wins The Outstanding Workers of the Republic Awards (TOWER)We are excited to announce that one of our employees, Nell D. Pagkalinawan, Principal Cloud Applications Consultant, has been recognized as one Read More
3 Jul 2021News.Riverbed SSL Certificate Management Made Simple, Secure, and at Scale | RiverbedSSL and TLS traffic are among the most common forms of secure network traffic in today’s enterprise. The Riverbed Application Acceleration Read More
2 Jul 2021News.PROFITAP Timestamp analysis: why you need it and 3 efficient ways to run itA crucial aspect of running and maintaining a network is achieving optimal performance. In the context of network monitoring, performance can be Read More
2 Jul 2021Micro Focus.News How does social responsibility relate to customer trust?Introduction Social responsibility is no longer a ‘niche’, instead it touches every industry around the world, including the software industry. Read More
1 Jul 2021McAfee.News.Webinars How to Proactively Increase Your Protection Against Ransomware with Threat IntelligenceWhich Ransomware campaigns and threat profiles are most likely going to hit you? MVISION Insights provides near real time statistics on the Read More
1 Jul 2021Allied Telesis.News Intelligent Asset Management: Riding the Wave of Predictive MaintenanceMaintenance and Repair Operations (MRO) are among the most important activities of modern industrial organizations. They enable enterprises to Read More
29 Jun 2021Forcepoint.News Spend now, pay later? Settling the score of technical debtTechnical debt is a complex concept, going back decades, and relatively simple misconfigurations like Fastly’s are just a very visible example of Read More
29 Jun 2021BeyondTrust.News.Webinars Taking PAM Back to the Basics: Privileged Password Management | BeyondTrustTaking PAM Back to the Basics: Privileged Password Management | BeyondTrust June 28, 2021 Open You May Also Be Interested In: Our website uses Read More
27 Jun 2021News.ThreatQuotient XDR is a Destination, Not a SolutionIf we define XDR as a solution, SOCs can’t reach their ultimate destination because, as a solution, XDR can’t be a holistic approach Read More
27 Jun 2021News.Versasec Another Perk of MFA: Lowered Insurance PremiumsDate: 2021-06-24Author: Carolina Martinez, General Manager Americas Previous << Governments Working Hard To Better Protect User Identities Read More
26 Jun 2021News.Opentext.Press releases What’s new in OpenText AxcelerateThe latest announcement by OpenText of Cloud Editions includes some great updates to OpenText™ Axcelerate™. Check out the latest Read More
25 Jun 2021Micro Focus.News Micro Focus Consulting. Professional. Service.I am Dr. James D. Borderick, and I look after the Competitive Benchmark research for Micro Focus, which I have been doing for over five years. I Read More
24 Jun 202124 Jun 2021Siemplify.Vendors REAL security to distribute Siemplify to serve the Southeast European region’s need for SOAR platformA distribution agreement has been concluded between Israel-headquartered Siemplify, the #1 Independent SOAR Platform, and Slovenia-based REAL Read More
24 Jun 2021Gartner.McAfee.News Transforming to a Predictive Cyber DefenseIf you’re like me, working from a home office, you can’t help but think about all of the cybersecurity tradeoffs that accompanied the Read More
23 Jun 2021Cofense.News It’s Not Safe: “Security Update” Goes Phishing via PDFFigure 1: Email Body The Cofense Phishing Defense Center (PDC) has observed a phishing campaign that aims to harvest Office365 (O365) Read More
22 Jun 2021News.Titus Data Classification Best PracticesAdam Strange · Monday, June 21st, 2021 Data classification tools not only help organizations to protect their data, they also help users Read More
22 Jun 2021Forcepoint.News Securing the Workforce of the Future – ForcepointFujitsu’s Head of Strategy and Growth, Workforce and Workspace Services, Andy Davis joined Forcepoint to discuss the changes and measures Read More
22 Jun 2021BeyondTrust.News IDSA Study Shows IT Leaders Embracing Identity-Centric Security to Close Remote Work & DX Gaps | BeyondTrustIDSA Study Shows IT Leaders Embracing Identity-Centric Security to Close Remote Work & DX Gaps | BeyondTrust June 18, 2021 Open You May Also Read More
21 Jun 2021McAfee.News Testing to Ensure Your Security Posture Never SlouchesTake, for example, the May 7th DarkSide ransomware attack that shut down Colonial Pipeline’s distribution network. That well-publicized Read More
20 Jun 2021News.ThreatQuotient ThreatQuotient Recognized as Best Security Investigation Platform by 2021 CDM Global Infosec AwardsRecent Award Wins Highlight Innovative Threat Intelligence and Security Investigation Capabilities, Women in Cybersecurity Leadership Reston, Va. Read More
20 Jun 2021News.Versasec As PKI Requirements in Government Agencies Grow, Versasec is there to HelpDate: 2021-06-17Author: Carolina Martinez, General Manager Americas Previous << MFA Could Have Prevented Pipeline Attack Better protecting Read More
19 Jun 2021Forcepoint.News 5 Steps to SASE: Connecting and Protecting Branch OfficesSo far in our #5steps2sase series, we’ve focused a lot on enabling individual users to safely connect to resources and use data obtained from Read More
19 Jun 2021News.Opentext How to handle chat data in eDiscovery and investigationsWater-cooler talk and quick chats in the office disappeared with the pandemic. But online chat—already a prevalent form of communication Read More
18 Jun 2021News.Riverbed Agentless Monitoring Solution for AWS VPC Traffic | AppResponse Cloud | RiverbedWe are in a time where companies already accept the importance of cloud-driven transformation, but gaining insights across cloud services, Read More
17 Jun 2021Gartner.McAfee.News McAfee Named a 2021 Gartner Peer Insights Customers’ Choice for SWGIn its announcement, Gartner explains, “The Gartner Peer Insights Customers’ Choice is a recognition of vendors in this market by Read More
16 Jun 2021Cofense.News Domain Doppelgangers: Your Good Name as Phishing Bait? Cofense, Confense. Big deal, right? Wrong. Here’s why. Does your company have an evil twin on the web? Threat actors may be leveraging Read More
15 Jun 2021Forcepoint.News New Research – Are headlines hype or are U.S. federal cybersecurity threats growing?In the latest Ponemon Institute research, “Cybersecurity Risks in the Federal Government,” sponsored by Forcepoint, Ponemon took a deeper Read More
15 Jun 2021BeyondTrust.News Defining & Protecting Critical Software to Improve U.S. Cybersecurity & Supply Chain Resilience | BeyondTrustDefining & Protecting Critical Software to Improve U.S. Cybersecurity & Supply Chain Resilience | BeyondTrust June 10, 2021 Open You May Read More
15 Jun 2021News.Qualys DarkSide RansomwareDarkSide ransomware is a relatively new ransomware strain that threat actors have been using to target multiple large, high-revenue organizations Read More
14 Jun 2021McAfee.News The Executive Order – Improving the Nation’s Cyber SecurityIt is clear from the EO that the Executive Office of the President is putting significant emphasis on cyber threat intelligence and how it will Read More
13 Jun 2021News.Press releases.ThreatQuotient Employee Spotlight – David StrombergEmployee Spotlight PROFILE – DAVID STROMBERG David Stromberg – Talent Acquisition Manager What was your first or the Read More
13 Jun 2021News.Versasec VPN Failure that Led to Colonial Pipeline Breach was Preventable with MFADate: 2021-06-10Author: Anders Adolfsson, Product Manager Previous << ACME support now available in vSECCMS When the Colonial Pipeline was Read More
12 Jun 2021News.Opentext Why you need a top digital experience platform in 2021The COVID-19 pandemic has accelerated a social and technology trend that has been happening for some time. The way we live our lives and conduct Read More
11 Jun 2021Ivanti.News Wall Street Journal Predicts Dire Cybersecurity Days Ahead, Endorses Zero TrustLet’s be honest for a second. This is a corporate blog. Yes, we aim to provide our readers with actionable, educational information. And, yes, Read More
11 Jun 2021Micro Focus.News Carbon Friendly IT – Saving Costs, Increasing Efficiencies and Protecting the PlanetTechnology can play a key role in helping to reduce an organization’s environmental impact. At Micro Focus, our aim is to make sustainable and Read More
8 Jun 2021News.Titus Key Takeaways from Biden’s Sweeping Executive Order on CybersecurityHome » Titus Blog » Key Takeaways from Biden’s Sweeping Executive Order on Cybersecurity Georgina Stockley Adam Strange · Friday, June Read More
8 Jun 2021BeyondTrust.News How to Penetration Test (Pentest) Remote Worker Endpoints: What’s in Scope, & What’s Off Limits | BeyondTrustHow to Penetration Test (Pentest) Remote Worker Endpoints: What’s in Scope, & What’s Off Limits | BeyondTrust June 1, 2021 Open You May Also Read More
6 Jun 2021News.ThreatQuotient Is Your Adversary James Bond or Mr. Bean?Especially with nation-state attacks, it’s critical to assess whether you’re up against jet fighter strength or a bumbler who tries Read More
6 Jun 2021News.Versasec evolutionID users can now enjoy PKI securityDate: 2021-06-01Author: Will Houry, VP of Sales Previous << HW PKI BrightTALK Today we announced our partnership with evolutionID. The Read More
5 Jun 2021Forcepoint.News 5 Steps to SASE: Safeguarding the Usage of Data EverywhereIn our first two episodes about the 5 Steps to SASE, we discussed the most common ways organizations begin using SASE: protecting access to the Read More
5 Jun 2021News.Opentext RIG Exploit Kits exploit Internet Explorer delivering Dridex TrojanThe RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser and Read More
4 Jun 2021Micro Focus.News Our Ambition to Inspire a Million LivesAt Micro Focus, we believe in the strength of collaboration and teaming to achieve positive impacts and meaningful outcomes. It’s this purpose Read More
3 Jun 2021cPacket Networks.News cPacket Networks Extends Industry-Leading Ultra-Low-Latency Monitoring and Brokering Solution for 100Gbps Network ObservabilityThe post cPacket Networks Extends Industry-Leading Ultra-Low-Latency Monitoring and Brokering Solution for 100Gbps Network Observability appeared Read More
3 Jun 2021McAfee.News Why May 2021 Represents a New Chapter in the “Book of Cybersecurity Secrets”If the situation sounds ominous, it is. The words and guidance outlined in the DoDZTRA and EO must be followed up with a clear path to action and Read More
3 Jun 2021News.Riverbed Transformative Technology | Business and Economic Impact of Digitization | RiverbedAccording to the Harvard Business Review, only 23% of companies are non-digital with few, if any products or operations that depend on digital Read More
2 Jun 2021News.PROFITAP New Video: IOTA API ConfigurationJohn Modlin, Systems Engineer from Profitap, shows in this video an overview of API configuration on IOTA.Read More
2 Jun 20212 Jun 2021Group-IB.News.RISK conference.Webinars GROUP-IB DIGITAL RISK SUMMIT 2021Join Group-IB Digital Risk Summit to hear about the latest global trends from industry experts, dive deep into new technologies, get insights Read More
1 Jun 2021News.Titus Top Data Security Challenges and How to Address ThemHelpSystems Webmaster · Tuesday, May 25th, 2021 Addressing an organization’s data security challenges requires some heavy lifting – no Read More
1 Jun 2021BeyondTrust.News SCADA and IoT Security: What is Broken, & Can it Be Fixed? | BeyondTrustSCADA and IoT Security: What is Broken, & Can it Be Fixed? | BeyondTrust May 28, 2021 Open You May Also Be Interested In: Our website uses Read More
1 Jun 2021News.Qualys Monitor Windows Registry Changes with Qualys File Integrity MonitoringWith Windows registries storing a large number of programs and OS security settings and a large amount of raw data, threat actors have begun to Read More
31 May 2021McAfee.News Happy Birthday GDPR!Granted, when GDPR was born it was after a 2-year gestation (transition) period. What followed were many sleepless nights with the new baby when Read More
30 May 2021News.Press releases.ThreatQuotient What Makes a Security Analyst Successful? Investigative ThinkingWhat Makes a Security Analyst Successful? Investigative Thinking LIZ BUSH The new SANS 2021 Report: Top Skills Analysts Need to Master analyzes Read More
30 May 2021News.Versasec Our PKI BrightTALK Coffee Break is over, but It is Not Too Late to Learn MoreDate: 2021-05-26Author: Tatjana Suhorukova, Business Development Previous << Diversity Day at Versasec In many corporations large and Read More
29 May 2021Forcepoint.Gartner.News Defining Zero Trust in the Wake of the Biden Administration’s Cybersecurity Executive OrderConfusion around Zero Trust But what is “Zero Trust”? How is it defined? What are its key components? That is important, because to this Read More
29 May 2021News.Opentext.Press releases What’s new in OpenText eDOCS CE 21.2Law firms and legal departments store thousands of matter-related documents for existing clients. When lawyers and their teams are pressured by Read More
27 May 2021Gartner.McAfee.News Cyber Cyber, Burning Bright: Can XDR Frame Thy Fearful Asymmetry?The outcome of an Attacker’s mission may depend entirely upon a single misplaced charge on a single memory chip on a single server, perhaps Read More
27 May 2021Allied Telesis.News Laying the Network Foundation for a Smart FactoryDigital transformation is the baseline for changes in almost any market. Information sharing between all the company systems become precious Read More
26 May 2021Cofense.News Cofense Virtual Roadshow: How Many Email Security Vendors can you Eliminate?Cofense’s solutions leverage global crowd-sourced phishing intelligence from over 26 million people reporting suspected phish, and offer Read More
25 May 2021Forcepoint.News Dealing with insider risk in the era of remote workForrester and Forcepoint together recently conducted a study to understand insider threat initiatives worldwide with 300 decision-makers. Read More
25 May 2021BeyondTrust.News Dispatches from Anywhere: Securing the Next Wave of Work | BeyondTrustDispatches from Anywhere: Securing the Next Wave of Work | BeyondTrust May 21, 2021 Open You May Also Be Interested In: Our website uses cookies Read More
25 May 2021News.Qualys Reinforce Defense with File Reputation and Trusted Source Intelligence in Qualys FIMMonitoring change events in the file system is both a crucial aspect of security and a critical compliance requirement. A file integrity Read More
24 May 2021McAfee.News Data Localisation – The Magic Bullet?The terms ‘data sovereignty’, ‘data residency’ and ‘data localization’ are a source of confusion for most Read More
23 May 2021News.Press releases.ThreatQuotient.Webinars Threat Intelligence, Integration and Automation in a Modern SOCThreat Intelligence, Integration and Automation in a Modern SOC LIZ BUSH As organizations continue to evolve their security operations maturity Read More
23 May 2021News.Versasec Celebrating Cultural DiversityDate: 2021-05-21Author: Ellen Thorén, Program Manager Previous << Zero Trust and MFA Thwart Breaches Today is a good day to talk about the Read More
22 May 2021Forcepoint.News Don’t be left behind by the unraveling of the enterpriseBut the cybersecurity industry has been going through a decade of change, and together we’ve arrived at yet another inflection point. Today’s Read More
22 May 2021News.Opentext 5 leadership lessons from the pandemicEvery area of business has faced its own challenges over the past 15 months—from sales and Read More
21 May 2021Micro Focus.News Micro Focus Account Management. Great Relationships. Great Teams.I am Dr. James D. Borderick, and I look after the Competitive Benchmark research for Micro Focus, which I have been doing for over five years. I Read More
20 May 2021McAfee.News.Webinars Miles Wide & Feet Deep Visibility of Carbanak+FIN7The MITRE Engenuity ATT&CK® Evaluation (Round3) focused on the emulation of Carbanak+FIN7 adversaries known for their prolific intrusions Read More
19 May 2021Cofense.News DARKSIDE Ransomware Operations Abuse Trusted PlatformsDARKSIDE Ransomware Operations By Dylan Duncan Since the malware release, DARKSIDE ransomware operators, and affiliates that use the service, Read More
18 May 2021BeyondTrust.News Will DarkSide Pipeline Ransomware Attack Fuel Cybersecurity Upgrades for Critical Infrastructure? | BeyondTrustWill DarkSide Pipeline Ransomware Attack Fuel Cybersecurity Upgrades for Critical Infrastructure? | BeyondTrust Go Beyond 2021: Customer + Read More
18 May 2021News.Qualys Nefilim RansomwareOver the past year there has been a rise in extortion malware that focuses on stealing sensitive data and threatening to publish the data unless Read More
18 May 2021News.Riverbed Secure SMB Traffic Optimization with the Riverbed WinSec Controller | RiverbedServer Message Block (SMB) traffic is a very common type of network traffic in most organizations, and it’s one of the most common types Read More
17 May 2021Micro Focus.News Volunteering Goes VirtualBeing able to give back, pay it forward – or simply help others by volunteering – has never been more important, particularly in the midst of the Read More
16 May 2021News.ThreatQuotient Security Automation: Data is More Important Than ProcessAutomation can’t be just about running the process, but must include three important stages I’ve written a lot about Read More
16 May 2021News.Versasec Zero Trust and MFA Thwart BreachesDate: 2021-05-13Author: Carolina Martinez, General Manager Previous << New perspective of the Versasec offices Over the weekend, a Read More
15 May 2021Forcepoint.News.Press releases.Webinars (Un)expected Lessons in Cybersecurity – Business and Security Strategies for The Post-Pandemic Unbound EnterpriseWith more than two decades in IT security, I’ve seen a lot. After all, I’ve been on record predicting all sorts of things that come true (or Read More
15 May 2021News.Opentext.Press releases The strategic value of low-code developmentWith organizations continuing to push toward digital transformation, the developers and business analysts within these businesses hold the key to Read More
14 May 2021Micro Focus.News Embracing our PLANET TogetherBringing people together who are passionate about reducing their environmental impact – this is the spirit of Micro Focus’ newest employee Read More
13 May 2021McAfee.News.Webinars What the MITRE Engenuity ATT&CK® Evaluations Means to SOC TeamsWhen the infamous Carbanak cyberattack rattled an East European bank three years ago this month few would have guessed it would later play a Read More
12 May 2021Cofense.News Pipeline PhishingWe keep saying it. It almost always starts with a phish. By Rohyt Belani, CEO Instead, media and pundits talk about the symptoms and how those Read More
11 May 2021Forcepoint.News Federal Agencies Like DHS Look Ahead to Strengthening Security and Reliability of Federal Information SystemsFor an agency like the Department of Homeland Security (DHS), which plays a leadership role across government in securing our country’s Read More
11 May 2021BeyondTrust.News Rethinking Remote Access Security: Can Zero Trust Replace VPNs? | BeyondTrustRethinking Remote Access Security: Can Zero Trust Replace VPNs? | BeyondTrust Go Beyond 2021: Customer + Partner Conference // June 7-11 // Read More
11 May 2021Ivanti.News Find Out How to Navigate the Everywhere Workplace with Ivanti Extended ProductsLast year was difficult for organizations of all sizes as the world made the abrupt shift to Work from Home (WFH), but don’t worry because Ivanti Read More
11 May 2021News.Qualys Google Android May 2021 Security Patch Vulnerabilities: Discover and Take Remote Response Action Using VMDR for Mobile DevicesThe recently released Android Security Bulletin for May 2021 addresses 40 vulnerabilities, out of which 4 are rated as critical vulnerabilities. Read More
10 May 2021McAfee.News RSA Conference 2021: The Best Place to Strengthen Your ResilienceAhead of the RSA virtual conference, I spoke with a few of my colleagues about the major themes we should expect to see at RSA this year. This Read More
9 May 2021News.ThreatQuotient ThreatQuotient Launches Data-Driven Approach to SOAR and XDR, Accelerating Detection & ResponseLeader in security operations solutions continues industry-first innovations with a new platform capability to streamline and simplify automation Read More
9 May 2021News.Versasec New perspective of the Versasec R&D officesDate: 2021-05-05Author: Joakim Thorén, CEO Previous << 400 Customers Life and work are all about perspectives, sometimes quite literally. Read More
8 May 2021Forcepoint.News Taking Remote Browser Isolation (RBI) to the next level in SASEToday, we announced that Forcepoint has acquired Cyberinc, a true innovator in the remote browser isolation industry. Their unique Isla Smart Read More
8 May 2021News.Opentext 4 reasons why technology is vital—during and after ‘unprecedented’ timesOrganizations rely on information to anticipate trends, take advantage of new opportunities, and succeed in today’s world. As organizations Read More
6 May 2021Gartner.McAfee.News McAfee Recognised in 2021 Gartner Solution Scorecard ReportGartner also has a separate team of analysts called the Technical Professionals Team that evaluates single products in greater depth. Their Read More
5 May 2021Cofense.News Phishing Victims’ Initiative Exploited by BazarBackdoor Campaigns in Attempts to Avoid DetectionThreat actors using BazarBackdoor have brought an unusual set of lures, techniques and infrastructure to enterprise users, exemplified in two Read More
4 May 2021News.Titus Data Security Best Practices Every CISO Should KnowAligning Data Security with Organizational Strategy The responsibility for an organization’s information and data security is a hefty one, Read More
4 May 2021LOGbinder.News Latest version of Supercharger brings 50+ updatesTowards the end of 2020 and in to 2021 something big has been happening with Windows Security. Over the past few months, the interest in Read More
4 May 2021Forcepoint.News 5 Steps to SASE: Protecting Remote Workers, a discussion with Dr. Chase CunninghamTo shed some light on this crucial topic, I recently sat down with several experts to talk about five of the most common steps that businesses Read More
4 May 2021BeyondTrust.News 10 Tips for Improving IT Support Efficiency | BeyondTrust10 Tips for Improving IT Support Efficiency | BeyondTrust Go Beyond 2021: Customer + Partner Conference // June 7-11 // Register Here Dismiss May Read More
4 May 2021News.Qualys The Convergence of Endpoint Protection with Detection & ResponseBy almost every account, trend, or metric, the cybersecurity threat landscape is getting worse year over year. According to Qualys Labs, 2020 saw Read More
3 May 2021News.Riverbed Unify Network and Security Operations | NetSecOps Collaboration | RiverbedFor decades network operations and security operations teams have functioned separately. That’s starting to change and with good reason, even Read More
2 May 2021Gartner.News.Press releases.ThreatQuotient Why answering the question of orchestration vs automation will improve your security effectivenessWhy answering the question of orchestration vs automation will improve your security effectiveness ANTHONY STITT The investment in security Read More
2 May 2021News.Versasec Versasec is 400 customers strongDate: 2021-04-28Author: Joakim Thorén, CEO Previous << Support Microsoft MIM and FIM CM 400. Four. Hundred. Four hundred. Four-zero-zero. Read More
1 May 2021Forcepoint.News Q&A with Carahsoft: Shoring up cybersecurity in the face of changing threats and tightening regulationsTo make sense of these issues and gain insights into developing trends, I caught up with Brian O’Donnell, vice president of sales at Carahsoft. Read More
1 May 2021News.Opentext Banks are fighting a multi-front war on fraudAccording to S&P Global, the COVID-19 pandemic caused a “perfect storm” for financial services companies, which witnessed a 238 Read More
29 Apr 2021McAfee.News New Security Approach to Cloud-Native Applications”IDC predicts, by 2025, nearly two-thirds of enterprises will be prolific software producers with code deployed daily, over 90% of new apps Read More
28 Apr 2021Cofense.News Sharing Documents via SharePoint Is Always a Good Idea: Not always…The Cofense Phishing Defense Center (PDC) has discovered a phishing campaign that targets Office 365 users and includes a convincing SharePoint Read More
27 Apr 2021Forcepoint.News A Look Back at To The Point Cybersecurity Podcast Episodes in Q1Jared Quance, an insider threat program manager for the U.S. government, shared his take on the role privileged users play, and how Sunburst has Read More
27 Apr 2021BeyondTrust.News BeyondTrust Bolsters Market-Leading Endpoint Privilege Management for Windows & Mac | BeyondTrustBeyondTrust Bolsters Market-Leading Endpoint Privilege Management for Windows & Mac | BeyondTrust April 22, 2021 Open You May Also Be Read More
27 Apr 2021News.Qualys WhatsApp Vulnerabilities: Automatically Discover and Remediate Using VMDR for Mobile DevicesWhatsApp has recently fixed critical and high-severity vulnerabilities affecting WhatsApp for Android, WhatsApp Business for Android, WhatsApp Read More
25 Apr 2021News.ThreatQuotient As You Modernize Your SOC, Remember the Human ElementAs Security Operations Centers (SOCs) mature, they need to tackle some tough challenges with respect to data, systems and people As Security Read More
25 Apr 2021News.Versasec MIM migration to vSEC:CMS is an easy and fastDate: 2021-04-23Author: Joakim Thorén, CEO Previous << Making PKI Inroads in Egypt The good news? Versasec makes migration to vSEC:CMS Read More
25 Apr 2021Allied Telesis.News Three Key Reasons to Deploy an IP-Based Video Surveillance System for Government ApplicationsThe global threat landscape is a huge cause for concern for many organizations and governments. Increasingly, they rely on video surveillance to Read More
24 Apr 2021Forcepoint.News Zero Trust: A Smarter Approach to SecurityPeople and wherever they access apps and data represent the new perimeter. Zero Trust is a security framework that can help safeguard the people Read More
24 Apr 2021News.Opentext Cutting the environmental costs of faxFax remains the secure communications backbone for healthcare, finance, government and other industries around the world. Each year, fax machines Read More
23 Apr 2021Micro Focus.News The Role of Technology in Driving SustainabilityJoin Us and Pledge to Do an Act of Green for Earth Day Climate change is a subject that is important to everyone, our customers, partners, Read More
22 Apr 2021Carbon Black.News VMware Carbon Black Delivers High-Fidelity Insight at Every Step of MITRE Engenuity ATT&CK® EvaluationFor the third year in a row, VMware Carbon Black today announced its participation in MITRE Engenuity’s third annual ATT&CK® Read More
22 Apr 2021McAfee.News Lessons We Can Learn From Airport SecurityThe airport operators are a lesson in supply-chain and 3rd party communications. They cooperate with airlines, retailers and government agencies, Read More
21 Apr 2021Cofense.News Home Buyers Beware – Tax-Themed Phish Hosted on TypeformPurchasing a home can be exciting for potential buyers. However, the loan application process can at times be both stressful and exhausting as Read More
20 Apr 2021Forcepoint.News.Webinars Keeping up with a Hybrid Workforce Requires Fast Tracking SASE in 2021Today, organizations must be able to provide fast, reliable, and secure access to their employees no matter where they’re located or what devices Read More
20 Apr 2021BeyondTrust.News Driving Change to Close the Cybersecurity People Gap | BeyondTrustDriving Change to Close the Cybersecurity People Gap | BeyondTrust April 19, 2021 Open You May Also Be Interested In: Our website uses cookies to Read More
20 Apr 2021News.Qualys April 2021 Patch Tuesday – 108 Vulnerabilities, 19 Critical, AdobeThis month’s Microsoft Patch Tuesday addresses 108 vulnerabilities, of which 19 are rated critical severity and 88 are rated high severity. Adobe Read More
18 Apr 2021News.Press releases.ThreatQuotient Pandemic sees organizations of all sizes and industries invest in CTIPandemic sees organisations of all sizes and industries invest in CTI ANTHONY STITT After a year full of unknowns and new normals, knowledge is Read More
18 Apr 2021News.Versasec Egypt PKI expert joins VersasecDate: 2021-04-14Author: Joakim Thorén, Founder and CEO Previous << Versasec Releases vSEC CMS S6.0 Versasec’s Global Presence is a Big Plus Read More
18 Apr 2021News.Riverbed Do’s and Don’ts of B2B Marketing in a Crisis | COVID-19, 1 Year Later | RiverbedIn March 2020, I was in London meeting with customers, partners and teammates and upon my return to the Bay Area, organizations were preparing Read More
17 Apr 2021Indeed Identity.News Roundtable: Best PAM approach – what requires your full attentionPrivileged access management is an important part of any cybersecurity policy. With the PAM market predicted to continue rapidly growing in the Read More
17 Apr 2021News.Opentext OpenText World Europe 2021—Grow with OpenTextWe have never worked this fast, and we will never work this slow again. In my keynote at OpenText World Europe 2021, I talked about the nexus of Read More
17 Apr 2021Array Networks.News Web Application Firewalls: More Essential Than EverVirtual meetings, online events, digital transactions and increased social media engagement is how many of us will remember changes brought about Read More
16 Apr 2021Micro Focus.News INSPIRE 20 Podcast: Meet Erik Day, Senior Vice President, Small Business, Dell TechnologiesErik Day, a senior vice president who leads Dell Technologies’ small-business division in North America and Brazil shares his thoughts on how he Read More
14 Apr 2021Cofense.News Computer Based Training: More of a Good Thing for More AudiencesThe Cofense Security Awareness Library has been updated with a clean new look for an improved learner experience in the latest (v6) edition of Read More
13 Apr 2021Forcepoint.News How Three Forcepoint Customers Protect Their Data While Enabling ProductivityForcepoint Customer Stories Why must we accept that breaches are inevitable? While traditional data protection provides visibility into your Read More
13 Apr 2021BeyondTrust.News The Top 10 Secrets of Admin Users | BeyondTrustThe Top 10 Secrets of Admin Users | BeyondTrust April 12, 2021 Open You May Also Be Interested In: Our website uses cookies to provide a better Read More
13 Apr 2021News.Qualys Google Android April 2021 Security Patch Vulnerabilities: Discover and Take Remote Response Action Using VMDR for Mobile DevicesThe recently released Android Security Bulletin for April 2021 addresses 36 vulnerabilities, out of which 2 are rated as critical Read More
11 Apr 2021News.Press releases.ThreatQuotient ThreatQuotient appoints Ramiro Cespedes as new Threat Intelligence Engineering ManagerMadrid, 8th April 2021 – ThreatQuotient, leader in Cyber Intelligence Operations Platforms, today announced the appointment of Ramiro Read More
11 Apr 2021Ivanti.News Service the Everywhere WorkplaceDrive outcomes with insights What if you could give employees reliably great experiences while improving outcomes across your organization? Read More
10 Apr 2021Forcepoint.News EMEA Perspective – Build Trust like a BankThe 2020 pandemic and cloud adoption have at least one thing in common – both have led to an increased digital surface of exposure and added Read More
10 Apr 2021News.Opentext Why is digital process automation critical to digital transformation?The pandemic has driven organizations to assess their business processes—and the people, systems and technology that support Read More
9 Apr 20219 Apr 2021Group-IB.News What goes around comes around: hackers leak other hackers’ data onlineSingapore, 08.04.2021 — Group-IB, a global threat hunting and adversary-centric cyber intelligence company, discovered that user data of the Read More
8 Apr 2021Carbon Black.News COVID-19 and HIPAA Enforcement Discretion Leaves Healthcare Organizations Vulnerable to Ransomware AttacksPatient engagement is a term that has been discussed in healthcare for years. But now, it’s an urgent priority as providers work to Read More
7 Apr 2021Cofense.News It Starts with a PhishJust as we were getting ready to put a bow on 2020, we were hit with the news of SolarWinds. Incident Response teams were barely coming up for Read More
6 Apr 2021News.Titus What is Data Security?What are the Barriers to Data Security? Today’s organizations exchange data at a larger volume and faster pace than ever before, and they do so Read More
6 Apr 2021BeyondTrust.News Addressing Malware, Threat Actors, & LotL Exploits with Application Control, & Allow / Deny Listing | BeyondTrustAddressing Malware, Threat Actors, & LotL Exploits with Application Control, & Allow / Deny Listing | BeyondTrust March 31, 2021 Open You Read More
4 Apr 2021News.ThreatQuotient Improve Data Utilization to Modernize the SOCThe Ability to Think Global, Act Local is One of the Hallmarks of a Modern Security Operations Center If you want to modernize your SOC to focus Read More
4 Apr 2021News.Versasec Versasec Releases vSEC:CMS S6.0Date: 2021-03-31Author: Joakim Thorén, Founder and CEO Previous << How To Use BitLocker with Smart Cards For the Versasec team, it’s Read More
4 Apr 2021Allied Telesis.News Strategies to Address Security Risks in IIOT DeploymentsOver the past few years, the Internet of Things (IoT) has become increasingly ubiquitous. Over 27 billion networked devices will be online in Read More
3 Apr 2021cPacket Networks.News cPacket Networks Delivers Industry-leading 100Gbps Packet Capture and Analytics Solution for Network ObservabilityThe post cPacket Networks Delivers Industry-leading 100Gbps Packet Capture and Analytics Solution for Network Observability appeared first on Read More
3 Apr 2021Forcepoint.News.Webinars Zero Trust and SASE: Teaming Up to Stop ThreatsBut back here in the real world, we’re seeing several dramatic shifts in the cybersecurity industry play out. As people fled their offices last Read More
3 Apr 2021News.Opentext Future-proofing your business with the cloudIt is no secret that technology has changed the way we work, socialize and learn. Most people cannot imagine their life or career without Read More
3 Apr 2021News.Riverbed Four Trends Guiding HR in 2021 and Beyond | COVID-19, 1 Year Later | RiverbedIt’s hard to believe that it’s been over a year since the onset of the global pandemic. I remember thinking initially that our offices would be Read More
2 Apr 2021News.PROFITAP Industrial Network Visibility and Cybersecurity in One Robust SolutionThe integration of advanced Operational Technology (OT) and Information Technology (IT) networks, high tech automation, supervisory control and Read More
2 Apr 2021Micro Focus.News Micro Focus is an Industry Leader in Consulting within Information Management and GovernanceAccording to Customers, how do we measure how we perform at consulting compared with our Competitors? Micro Focus uses double-blind competitive Read More
1 Apr 2021Carbon Black.News Linux Distribution Coverage Extended Across the VMware Carbon Black CloudIn 2020, a record 56 new Linux malware families were discovered. We are now seeing this trend continue into the new year with the latest Read More
1 Apr 2021Gartner.McAfee.News.Webinars 5 Ways MVISION XDR Innovates with MITRE ATT&CK It is less well known how these tools align to improve the efficacy of your cybersecurity defenses leveraging key Read More
31 Mar 2021Indeed Identity.News 5 global PKI trends that affect any enterpriseEnsuring the highest level of security, Public Key Infrastructure enables core enterprise processes of users’ authentication, encryption Read More
30 Mar 2021Forcepoint.News Forcepoint Honored to be a Finalist in Two Microsoft Security 20/20 Award CategoriesIt’s hard to believe that just over a year ago, the Forcepoint team was focused on delivering Azure Sentinel integrations across our NGFW, DLP Read More
30 Mar 2021BeyondTrust.News Multicloud Security: More Clouds More Problems | BeyondTrustMulticloud Security: More Clouds More Problems | BeyondTrust Free Privileged Account Discovery Tool: Identify & secure credentials to stop Read More
30 Mar 2021News.Qualys Unified Dashboard Preview for Enhanced Security VisualizationQualys has introduced the Unified Dashboard Framework (UDF) to enrich your dashboarding experience. Unified Dashboard (UD) brings information Read More
28 Mar 2021News.Press releases.ThreatQuotient Women in Cybersecurity – Melissa Smith – King & UnionWomen in Cybersecurity PROFILE – MELISSA SMITH Melissa SmithKing & Union – Vice President, Strategic Partnerships & Read More
27 Mar 2021Forcepoint.News “Tiny Crimes” – How Minor Mistakes When Remote Working Could Lead to Major Cybersecurity BreachesAs a leader in user and data protection, Forcepoint knows that understanding users’ behavior is critical for protecting against emerging Read More
27 Mar 2021News.Opentext Supercharge your contact center with real-time speech analyticsCustomer satisfaction, more than ever, has become a key metric for measuring business success. The quality of your products and level of support Read More
25 Mar 2021Carbon Black.News.Webinars Women in Security Part 5: Meet Lavine Oluoch, Threat AnalystThis post is part of our Women’s History Month series – follow along with us on Twitter @VMwareCarbonBlack In continued Read More
24 Mar 2021Cofense.News COVID 19 Vaccine Phishing Email: Can’t Vaccinate Against This Phish – Or Can You?It’s no secret that the COVID-19 vaccine is being rolled out and met with extreme enthusiasm. Some companies are reaching out to their employees Read More
23 Mar 2021Forcepoint.News See Zero Trust in Action at the Zero Trust Demo ForumThe Zero Trust Demo Forum represents a great place to see Zero Trust solutions in action and to learn about a variety of aspects to consider for Read More
23 Mar 2021BeyondTrust.News Zero Trust: New Name, New Tech for a Classic Security Approach | BeyondTrustZero Trust: New Name, New Tech for a Classic Security Approach | BeyondTrust Free Privileged Account Discovery Tool: Identify & secure Read More
23 Mar 2021News.Qualys Qualys Leadership Update: Moving Forward TogetherToday, we announced that Philippe Courtot has resigned from his CEO role. As you may know, Philippe took a leave of absence due to health issues Read More
22 Mar 2021Micro Focus.News Micro Focus – Installation Experience SensationMicro Focus is Leader in the Installation Experience According to Customers, how do we measure how we perform at Installation compared with our Read More
21 Mar 2021News.ThreatQuotient Want to Modernize Your SOC? Start with DataHow to Tackle the Data Challenge to Improve and Accelerate Detection and Response I’ve discussed before how Security Operations Read More
21 Mar 2021News.Versasec We take you through the smart card-Bitlocker setup process, step-by-stepDate: 2021-03-18Author: Chin Jien “C-J” Lau, Technical Consultant Previous << Versasec logs best year yet Data theft remains one of the Read More
20 Mar 2021News.Opentext What’s new in OpenText Extended ECM Platform CE 21.1 and OpenText Content Suite Platform CE 21.1OpenText™ continues to push the boundaries of industry leading Content Services with these latest enhancements that provide better ways to Read More
19 Mar 2021cPacket Networks.News cPacket Networks Showcases Market-Leading Intelligent Observability Platform at Microsoft IgniteThe post cPacket Networks Showcases Market-Leading Intelligent Observability Platform at Microsoft Ignite appeared first on cPacket Networks.Read More
19 Mar 2021News.ThreatMark ThreatMark recognized in Now Tech: Enterprise Fraud Management Q1 2021 reportWe’re excited to announce that ThreatMark has been recognized as an Enterprise Fraud Management Provider in Forrester’s Now Tech: Enterprise Read More
18 Mar 2021Carbon Black.News.Webinars Fighting Back in 2021: 4 Best Practices for Security Teams“Attacks these days don’t have a natural beginning or ending. For an adversary, every attack is an opportunity to learn something Read More
18 Mar 2021News.Riverbed 365 Days of 100% Remote Work | Lessons Learned and the Future of Work | RiverbedJust over a year ago today, I wrote a note to our employees that we were planning to close our offices for at least two weeks due to COVID-19. Read More
17 Mar 2021Indeed Identity.News Where does PKI evolution go? – Interview with Nevenko BartolinčićThere is currently much controversy over the PKI status in modern cybersecurity which raises a number of curious questions. What is the PKI role Read More
16 Mar 2021News.Titus What are Data Security Solutions and How do They Work?Georgina Stockley · Thursday, March 11th, 2021 Data is one of the valuable commodities shared by all organizations regardless of size, Read More
16 Mar 2021BeyondTrust.News Dangers of IoT Privilege Management Blind Spots Exposed in Verkada Security Camera Breach | BeyondTrustDangers of IoT Privilege Management Blind Spots Exposed in Verkada Security Camera Breach | BeyondTrust Free Privileged Account Discovery Tool: Read More
14 Mar 2021News.Press releases.ThreatQuotient Women in Cybersecurity – Michelle MattearWomen in Cybersecurity PROFILE – MICHELLE MATTEAR Michelle MattearThreatQuotient – Director, Customer Success What do Read More
14 Mar 2021Allied Telesis.News Lifting the Lid: Explaining SD-WANIf your modern business has more than one geographic location, you‘ll have heard the term SD-WAN before. Short for Software Defined Wide Area Read More
13 Mar 2021News.Opentext Grow Faster with OpenText Cloud Edition 21.1Modern organizations know that accelerating digital transformation is critical to their success. The launch of OpenText™ Cloud Edition (CE) Read More
12 Mar 2021Micro Focus.News Celebrating International Women’s Day (IWD) at Micro FocusAt Micro Focus, we celebrate the many achievements of women colleagues as well as in our communities and in our personal lives on International Read More
11 Mar 2021Carbon Black.News 2021 Cybersecurity Outlook: Attackers vs. DefendersCOVID-19, One Year Later 2020 was undoubtedly a defining year for cybersecurity – a year that ended with the SolarWinds breach, which Read More
11 Mar 2021Ivanti.News March Patch Tuesday 2021There was an interesting start to March, with four Exchange Server exploits and an out of band update. There is an additional Zero Day Read More
11 Mar 2021McAfee.News Why MITRE ATT&CK Matters?To enable practitioners in operationalizing these strategies, the knowledge base provides the “why” and the “what” with Read More
10 Mar 2021Cofense.News Meeting with A Phish: Zoom-Themed Phish in UseThe importance of having contactless, digital conferencing software (such as Zoom or Microsoft Teams) is well understood by many companies Read More
9 Mar 2021BeyondTrust.News VPNs: Will Zero Trust & Improved Secure Architectures Spell the End? | BeyondTrustVPNs: Will Zero Trust & Improved Secure Architectures Spell the End? | BeyondTrust Free Privileged Account Discovery Tool: Identify & Read More
9 Mar 2021News.Qualys Qualys Update on Accellion FTA Security IncidentNote: Updated March 4 with additional detail. New information has come out today, March 3, related to a previously identified zero-day exploit in Read More
8 Mar 2021McAfee.News.Webinars The Fastest Route to SASEDecision makers seek a faster, more efficient high road to cloud and network transformation without compromising security. The need for speed and Read More
7 Mar 2021News.Press releases.ThreatQuotient Women in Cybersecurity – Katie Teitler – Tag CyberWomen in Cybersecurity PROFILE – KATIE TEITLER Katie TeitlerTAG Cyber – Senior Cyber Security Analyst What do you do at Tag Read More
6 Mar 2021Forcepoint.News Advancements in Invoicing – A highly sophisticated way to distribute ZLoaderSpam campaigns using this new distribution chain first started to appear in early February 2021. The content of the emails follow the Read More
6 Mar 2021News.Opentext What’s new in Vendor Invoice Management CE 20.4Currently, there are vast computing powers available to the end customer. However, this can cause complete chaos when it comes to managing the Read More
4 Mar 2021Carbon Black.News Women in Security: Celebrating Women’s History MonthIn celebration of Women’s History Month, we are honoring all of the women at VMware who inspire, lead, innovate and set the stage for the Read More
4 Mar 2021McAfee.News.Webinars Hacking Proprietary Protocols with Sharks and PandasThis course of events demands that both offensively and defensively minded “good guys” band together to remove the unknown from as Read More
3 Mar 20213 Mar 2021News REAL Security The Wall-builder of the year 2020We are honoured to receive recognition for our efforts and especially expertise in Next Generation Firewall field from our long term loyal and Read More
3 Mar 20213 Mar 2021News WEBINAR CyberSocial: Analysis of a Threat Report and how to make it actionable?In this CyberSocial, ThreatQuotient and FireEye will cover the response process from initial threat report to the action taken, to Read More
3 Mar 2021News.Riverbed Fixing Network Performance Issues Before Users Notice | Unified NPM | RiverbedThis reactive modality can create a material impact to user productivity and has a knock on effect that impacts the organisation’s customers and Read More
3 Mar 2021News.Riverbed Fixing Network Performance Issues Before Users Notice | Unified NPM | RiverbedFor many organisations, the status quo involves IT teams troubleshooting and firefighting network and application performance issues after users Read More
3 Mar 2021Cofense.News Up and Coming Phishing Campaign Is Taxing to UsersWith U.S. tax season upon us, it’s time to remind our users to watch for emails hitting their inboxes related to tax documents. Threat actors are Read More
2 Mar 2021BeyondTrust.News How to Manage and Secure Service Accounts: Best Practices | BeyondTrustHow to Manage and Secure Service Accounts: Best Practices | BeyondTrust Free Privileged Account Discovery Tool: Identify & secure credentials Read More
2 Mar 2021News.PROFITAP Bringing network visibility to unmanaged power utility substationsProfitap was tasked by a leading power utility company in a South-central State in the USA to provide network visibility to a group of unmanaged Read More
28 Feb 2021News.Niagara Networks.Press releases PCI Compliance – What is it, why is it needed and who needs to comply?Payment processing security has, in technology terms a long history. Toward the end of 2004, five major credit card companies (American Express, Read More
28 Feb 2021News.ThreatQuotient Elevate the Value of Threat Intelligence in the SOCSecurity Operations Centers (SOCs) Are Now Becoming Detection and Response Organizations More organizations are producing and consuming cyber Read More
28 Feb 2021News.Versasec How Thales Accelerate 2021 Made Thinking Outside the Box a Game ChangerDate: 2021-02-24Author: Tatjana Suhorukova, Business Development Previous << Feeling SASE As social distancing and stay-at-home orders Read More
27 Feb 2021Forcepoint.News EMEA Perspective – Building Resilient CybersecurityIt’s no secret that hackers outnumber the cybersecurity professionals trying to stop them. And that gap will likely continue to widen. But Read More
27 Feb 2021News.Opentext Tackling the challenges of remote working during a pandemicPlanning flight operations is a complex and time-critical task, made even more challenging during the coronavirus pandemic. Eurowings, a Read More
27 Feb 2021Array Networks.News 6 Networking Trends in 2021: Let’s Get Braced for the “Next Normal”Over the last decade, we’ve seen some of the most significant disruptions in networking technology. However, nothing beats the speed at Read More
26 Feb 2021Micro Focus.News INSPIRE 20 Podcast: Meet Rod Flavell, CEO, FDM GroupINSPIRE 20 Podcast: Meet Rod Flavell, CEO, FDM Group Rod Flavell, founder and chief executive officer of the FDM Group, ensures that inclusivity Read More
25 Feb 2021Carbon Black.News VMware Carbon Black Named to the 2021 CRN Security 100 ListWe are proud to announce that CRN®, a brand of The Channel Company, has named VMware Carbon Black to its annual Security 100 list. The Read More
24 Feb 20218 Mar 2021News UTIMACO WEBINAR: Securing your IT INFRASTRUCTUREJOIN US on March 11th where we will be presenting you how to ensure your IT infrastructure from attacks. In this webinar we discuss the Read More
24 Feb 2021Cofense.News Telegram Utilized for Harvesting CredentialsTelegram is a popular messaging app. Its encrypted messages, and potential message self-destruct options, can be attractive to legitimate users Read More
23 Feb 2021BeyondTrust.News 3 Powerful Tools for CISOs to Boost their Organizational Influence | BeyondTrust3 Powerful Tools for CISOs to Boost their Organizational Influence | BeyondTrust Free Privileged Account Discovery Tool: Identify & secure Read More
21 Feb 2021News.Press releases.ThreatQuotient Reducing Enterprise Cyber Risk During COVID-19Reducing Enterprise Cyber Risk During COVID-19 ED AMOROSO This article was shared with the TAG Cyber community during the earliest days of the Read More
21 Feb 2021News.Versasec A shifting data access and storage dynamic has given rise to a new security category: Secure access service edgeDate: 2021-02-18Author: Ellen Thorén Previous << Sandia National Laboratories Casestudy The growth of mobile, edge and cloud data are Read More
20 Feb 2021Forcepoint.News Help me trojanize you – Microsoft Compiled HTML Help is back for another roundIn the past few weeks, malicious spam campaigns have surfaced that include attachments of varying archive types. Whilst the archives were mostly Read More
20 Feb 2021News.Opentext Modernize your legacy applicationsMany organizations continue to hold onto legacy applications and systems for compliance and regulatory reasons. But they find it expensive and Read More
18 Feb 2021McAfee.News Domain Age as an Internet Filter CriteriaDomain Age Feature Definition The sites and domains of the internet are constantly changing and evolving. In the first quarter of 2020 an average Read More
18 Feb 2021News.Riverbed Pinpointing Application Performance Issues with Unified NPM | RiverbedWith employees and business partners working from home due to the pandemic, non-enterprise internet connections have exacerbated the issue of Read More
18 Feb 2021Allied Telesis.News How Networking Supports Zero Defects ManufacturingIn recent years, manufacturing enterprises are accelerating their digital transformation as part of the fourth industrial revolution (Industry Read More
17 Feb 2021Indeed Identity.News The New Normal of European PKI – An Interview With CA Expert Adam RossThe roundtable «Evolution of Trust: Get ready for PKI 2.0» was about the most confusing, yet vital topics that remain puzzles to many Read More
17 Feb 20215 Mar 2021Extrahop.News Real security is extending their presence with a NDR market leader ExtraHop across the Central Eastern EuropeReal security, a Slovenian based Value Added distributor enters Poland, Czech Republic and Bulgaria by joining forces with ExtraHop, a market Read More
17 Feb 2021Cofense.News Phish Found in SEG-Protected Environments Week ending February 12, 2021100% of the phish seen by the Cofense Phishing Defense Center (PDC) have been found in environments protected by Secure Email Gateways (SEGs), Read More
16 Feb 2021BeyondTrust.News Aligning Credential & Identity-Based Risk Management with Government Mandates | BeyondTrustAligning Credential & Identity-Based Risk Management with Government Mandates | BeyondTrust Free Privileged Account Discovery Tool: Identify Read More
16 Feb 202116 Feb 2021News JOIN THE EKRAN SYSTEM PARTNER PROGRAMEkran System® is a full cycle insider threat management platform that focuses on three core goals: deter, detect, and disrupt Date: Friday, 19th Read More
16 Feb 2021News.Qualys Expand Your Vulnerability & Patch Management Program to Mobile Devices with Qualys VMDRAs mobile devices have become ubiquitous in almost every business process, whether in bank branches, manufacturing sites or retail stores, they Read More
14 Feb 2021News.Niagara Networks A brand-new year and cybersecurity defense thoughtsIt is a brand-new year, and by now you would probably hear from someone that they were busy or sharing about their unique virtual SKO experience.Read More
14 Feb 2021News.Press releases.ThreatQuotient Automate, Adopt, Adapt: How Cyber Threat Intelligence Evolved over the last 12 monthsAutomate, Adopt, Adapt: How Cyber Threat Intelligence Evolved over the last 12 months LIZ BUSH The SANS 2021 Cyber Threat Intelligence (CTI) Read More
13 Feb 2021Forcepoint.News Why Zero Trust is Needed in the Real World TooA real-word example of why Zero Trust matters But the need for Zero Trust doesn’t stop at the cyber edge. With so many processes in our daily Read More
13 Feb 2021News.Opentext What is digital experience?Digital experience inhabits a realm packed with similar terms. You have digital experience management (DXM), customer experience (CX), customer Read More
12 Feb 2021Micro Focus.News Spotlight on Black History MonthAt Micro Focus, our theme for Black History Month in 2021 is “Embracing the Past While Building for the Future”. We caught up with Eric Beulah, Read More
11 Feb 2021Ivanti.News February Patch Tuesday 2021Second Patch Tuesday of 2021 is here and while the CVE counts are low there are a number of publicly disclosed and zero day vulnerabilities to be Read More
11 Feb 2021Gartner.McAfee.News XDR – Please Explain?Security vendors have spent the last two decades providing more of the same orchestration, detection, and Read More
10 Feb 2021Cofense.News Phish Found in Proofpoint-Protected Environments Week ending February 5, 2021Cofense solutions enable organizations to identify, analyze, and quarantine email threats in minutes. 100% of the phish seen by Read More
9 Feb 2021BeyondTrust.News A Cybersecurity Wellness Check for the Healthcare Industry | BeyondTrustA Cybersecurity Wellness Check for the Healthcare Industry | BeyondTrust Free Privileged Account Discovery Tool: Identify & secure Read More
9 Feb 2021News.Qualys Unified SaaS Application Security, Detection, and ResponseOrganizations are rapidly embracing Software as a Service (SaaS) applications for scalability, ease & flexibility of use, and the benefits of Read More
8 Feb 2021McAfee.News 6 Best Practices for SecOps in the Wake of the Sunburst Threat CampaignPlan, test and continuously improve your SecOps processes with effective purple-teaming exercises. Try to think like a stealthy attacker and Read More
7 Feb 2021News.Press releases.ThreatQuotient How ThreatQ Helps Bridge the Threat Hunting Skills GapHow ThreatQ Helps Bridge the Threat Hunting Skills Gap LIZ BUSH If you’re not familiar with the TAG Cyber Security Annual, you should be! Read More
6 Feb 2021Forcepoint.News Understanding Insider Threat Before the BreachTwo recent examples of insider threat show how incorrect information can lead to bad decisions. In one, a data scientist who previously tracked Read More
6 Feb 2021News.Opentext For many patients, telehealth is here to stayTelehealth has been a topic of discussion for decades in healthcare. While innovators in medicine and technology have long promoted the Read More
5 Feb 2021Micro Focus.News Strategically #BetterTogether – Micro Focus plus our Channel PartnersHow do we measure how strategic we are to our customers? Micro Focus uses double-blind competitive benchmarking in order to gauge how well we Read More
4 Feb 2021Carbon Black.News The State of Healthcare Cybersecurity: VMware Carbon Black Explores the Surge in Cyber ThreatsOn the frontline of the pandemic, perhaps no industry was impacted and forced to innovate and transform as quickly as healthcare in 2020. Whether Read More
3 Feb 2021News.Riverbed Data Security Challenges in the Rush to the Cloud | RiverbedIn their rush to the cloud, enterprises will need to take into consideration three new data security challenges as they reevaluate where their Read More
3 Feb 2021News.Riverbed Data Security Challenges in the Rush to the Cloud | RiverbedThe challenges of working from home have caused organizations to reevaluate how they look at their networks and the data that lives on them. The Read More
3 Feb 2021Cofense.News Emotet Disrupted but Likely to ReturnBackground Originally a banking Trojan, Emotet evolved to become more of a gateway for other malware families such as Ryuk, TrickBot, Read More
2 Feb 2021News.Titus HIPAA and 2021 Healthcare Data Security TrendsGeorgina Stockley · Tuesday, February 2nd, 2021 The ramifications of this year’s global pandemic will continue to drive unprecedented Read More
2 Feb 2021Forcepoint.News.Webinars How Cybersecurity Changed in 2020 and What it Means for 2021Now, as much of the world continues working from home, that means company data, networks and employees themselves are vulnerable to multiple Read More
2 Feb 2021BeyondTrust.News Understanding Sudo Vulnerability CVE-2021-3156 & How Privilege Management for Unix & Linux Can Help | BeyondTrustUnderstanding Sudo Vulnerability CVE-2021-3156 & How Privilege Management for Unix & Linux Can Help | BeyondTrust Free Privileged Account Read More
2 Feb 2021News.PROFITAP DNS – OR ALSO: WHY IS MY INTERNET NOT WORKING?This blog was written in collaboration with magellan netzwerke GmbH, A Profitap Partner. DNS – OR ALSO: WHY IS MY INTERNET NOT Read More
2 Feb 2021News.Qualys Unpacking the CVEs in the FireEye Breach – Start Here FirstIn a blog post on Dec. 22, 2020, Qualys revealed it has identified 7.5 million instances of vulnerability to the stolen FireEye Red Team Read More
1 Feb 2021McAfee.News Schrems II – A few Things to Keep in Mind!Alas, we have possibly never been so much away of such harmonization. 128 out of 194 countries have put in place legislation to secure the Read More
1 Feb 2021Micro Focus.News Inspiring students to imagine their future careersUnder Pressure For too long, there has been tremendous reliance on parents, schools and government to capture children’s imaginations – to help Read More
31 Jan 2021News.ThreatQuotient ThreatQuotient appoints Eutimio Fernandez as new Country Manager for SpainMadrid, January 29, 2021 – ThreatQuotient, a leader in Security Operations Platforms, today announced the appointment of Eutimio Fernandez Read More
31 Jan 2021News.Versasec For more than 70 years, Sandia National Labs has resolved the nation’s challenging security issues, and they turned to Versasec’s vSEC:CMS to solve their security migration challenges.Date: 2021-01-25Author: Carolina Martinez Previous << Effective Remote PKI Management For more than 70 years, Sandia has delivered Read More
30 Jan 2021Forcepoint.News Managing the Insider Threat – An ISF Panel DiscussionThe goal of the panel discussion was to explore insider threat and the impact it has on cybersecurity while offering tangible solutions for Read More
30 Jan 2021News.Opentext Digitalization in procurementA recent blog on ‘The resilient Procurement organization’ described the benefits of using OpenText™ Extended ECM for SAP® Read More
29 Jan 2021Micro Focus.News Data Privacy Day: Why Protecting Data Matters to Your Bottom LineWhen it comes to data privacy, who do consumers trust? A recent data privacy survey by McKinsey & Company asked 1,000 consumers to rank the Read More
28 Jan 2021Carbon Black.News VMware Carbon Black Champions Data Privacy Day 2021Today is Data Privacy Day, an annual effort hosted by the National Cybersecurity Alliance (NCSA) to raise awareness about the importance of Read More
27 Jan 2021Cofense.News Phish Found in Proofpoint-Protected Environments Week ending January 22, 2021Cofense solutions enable organizations to identify, analyze and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More
26 Jan 2021News.Titus 10 Tips to Protect Your Company´s Data in 2021Georgina Stockley · Monday, January 25th, 2021 The amount, complexity, and relevance of the data that companies handle has increased Read More
26 Jan 2021BeyondTrust.News Privilege Management for Unix & Linux Continues Rapid Growth by Securing Cloud Infrastructure | BeyondTrustPrivilege Management for Unix & Linux Continues Rapid Growth by Securing Cloud Infrastructure | BeyondTrust Free Privileged Account Discovery Read More
24 Jan 2021News.Press releases.ThreatQuotient Threat hunting is now pervasive, learn how the ThreatQ Platform helps support your teamThreat hunting is now pervasive, learn how the ThreatQ Platform helps support your team LIZ BUSH As I mentioned in an earlier blog, threat Read More
23 Jan 2021Forcepoint.News Revolutionising Cybersecurity – SASE Special Report by RaconteurThere are six parts to the paper. It is interspersed with independent market data from the Ponemon Institute, Accelerate Technologies, Accenture Read More
23 Jan 2021News.Opentext We need to talk about contentLet’s start with a question: In the current focus on digital initiatives, are energy companies overlooking the importance of content? And, Read More
22 Jan 202125 Jan 2021News.ThreatQuotient THREATQUOTIENT WEBINAR: Empower the human element with Cyber Threat IntelligenceThe most important asset in your organization is your human resource, who will run the investigation, analyse the data and take actions on it. Read More
22 Jan 2021Micro Focus.News How Many COBOL Programmers Does it Take to Change a Lightbulb?COBOL’s continued popularity receives further evidence. Digital Marketing expert and avid COBOL fan Mark Plant reports that another major Read More
21 Jan 2021Carbon Black.News VMware Carbon Black Cloud™ Awarded Cyber Catalyst DesignationVMware Carbon Black Cloud has been awarded a Cyber CatalystSM designation for its cloud native endpoint and workload protection platforms, which Read More
19 Jan 2021BeyondTrust.News Protecting the Government Workforce of the Future with Secure Remote Access | BeyondTrustProtecting the Government Workforce of the Future with Secure Remote Access | BeyondTrust Free Privileged Account Discovery Tool: Identify & Read More
19 Jan 2021News.Qualys January 2021 Patch Tuesday – 83 Vulnerabilities, 10 Critical, One Zero Day, AdobeThis month’s Microsoft Patch Tuesday addresses 83 vulnerabilities. The 10 Critical vulnerabilities cover Windows codecs, Office, HEVC video Read More
18 Jan 2021News.Riverbed User Experience/App Performance vs. Network Security | Enterprise SD-WAN Trade-Offs | RiverbedIs it possible to meet user expectations and maintain SD-WAN security? One benefit of SD-WAN is that it makes it easy to steer certain traffic Read More
17 Jan 2021News.ThreatQuotient ThreatQuotient Named McAfee’s Global Security Innovation Alliance Partner Of The Year For Second Consecutive YearDepth of integrations, early MVISION Marketplace launch, and the most deal closures within SIA programs distinguishes ThreatQuotient among McAfee Read More
17 Jan 2021News.Versasec As remote workforces grow, managing PKI devices is still simple and effectiveDate: 2021-01-12Author: Anders Adolfsson and Michael Samara Previous << Microsoft Store Due to the 2020 global pandemic, companies are Read More
16 Jan 2021Forcepoint.News Top 10 To The Point Cybersecurity Podcast Episodes of 2020And without further ado, here’s the Top 10 episodes of 2020: Be one of the first 10 to share the episode or this blog and receive your Read More
16 Jan 2021News.Opentext 7 information challenges impacting the semiconductor boom in 2021While the worst of the COVID-19 pandemic slowed the semiconductor sector, it is now recovering and can look forward Read More
15 Jan 2021Micro Focus.News INSPIRE 20 Podcast: Meet Morag Lucey of TeleverdeIt’s back, the INSPIRE 20 podcast returns today with Morag Lucey, CEO of Televerde, a company built on second chances. This forward thinking Read More
14 Jan 2021Carbon Black.News.Webinars Bridge the Gap between Security and IT in Cloud Workload ProtectionIt often feels as though Security and IT are trying to build the same house from different blueprints. Security works tirelessly to stay ahead of Read More
14 Jan 202121 Jan 2021I4P.News Encryption resolution adoptedThe Council of Europe has adopted a resolution on encryption that states that competent authorities must be able to access encrypted data in a Read More
13 Jan 2021Checkmarx.News CVE-2020-35774: twitter-server XSS Vulnerability DiscoveredAfter researching twitter-server, the Checkmarx Security Research Team discovered a reflected cross-site scripting (XSS) vulnerability, assigned Read More
13 Jan 2021Cofense.News Coronavirus Screening and Testing, and a Sense of Urgency Among EmployeesThe Cofense PDC (Phishing Defense Center) has seen a continuous campaign by malicious actors exploiting the COVID-19 pandemic by using cleverly Read More
12 Jan 2021BeyondTrust.News How to Manage Your CI/CD Toolset Secrets with One Solution: 6 Benefits of DevOps Secrets Safe | BeyondTrustHow to Manage Your CI/CD Toolset Secrets with One Solution: 6 Benefits of DevOps Secrets Safe | BeyondTrust Free Privileged Account Discovery Read More
11 Jan 2021Ivanti.News 5G and the Journey to the EdgeRecently, AT&T Cybersecuritypublished important findings in the tenth edition of their Insights report entitled, “ 5G and the Journey to the Read More
11 Jan 2021McAfee.News McAfee Welcomes its ISO 27701 Certificate!At McAfee, we adhere to a set of core values and principles – We Put the Customer at The Core, We Achieve Excellence with Speed and Read More
10 Jan 2021News.ThreatQuotient Perseverance. Pushing Security Operations Forward in 2021We Have the Capabilities to Persevere and Reach the Next Level of Security Maturity For obvious reasons, perseverance has been the theme for 2020 Read More
10 Jan 2021FireEye.News Excelerating Analysis – Tips and Tricks to Analyze Data with Microsoft ExcelIncident response investigations don’t always involve standard host-based artifacts with fully developed parsing and analysis tools. At FireEye Read More
9 Jan 2021Forcepoint.News Looking Back at December’s To The Point Cybersecurity Podcast EpisodesForcepoint To The Point Cybersecurity In December, To The Point Cybersecurity podcast featured discussions with government cyber leaders on Read More
9 Jan 2021News.Opentext Evolving customer communicationsTargeted customer communications are a powerful way to increase engagement and build brand loyalty. Done poorly, Read More
7 Jan 2021McAfee.News The Road to XDRThe Building Pressure for XDR Let’s start with why XDR? The cry for XDR reflects where cybersecurity is today with fragmented, Read More
6 Jan 2021FireEye.News Leveraging Smart Launcher to Evade the EvadersSmart Launcher is a technology designed by FireEye to rapidly upgrade and modify the FireEye MVX sandbox technology used in our Network Security Read More
6 Jan 2021Cofense.News All I Wanted Was for 2020 to End2020 was far from ordinary. By Dylan Duncan Every year, we see threat actors improve their methods and adapt to world events, bringing new Read More
5 Jan 2021News.Qualys Technical Deep Dive Into SolarWinds BreachMany organizations have been compromised by the recent SolarWinds breach, which seems to be a targeted attack against both government and private Read More
5 Jan 2021Centrify.News RSS is deletedThis RSS is deleted because you didn’t use it for long time. Please consider purchasing one of our PRO plans to prevent this in the future Read More
3 Jan 2021News.Riverbed Maximizing Network and Application Performance and Visibility: TFD22 Recap | RiverbedThe last three months may have been a whirlwind of activity for you. Many organizations are trying to wind down projects, wrap up the spending on Read More
2 Jan 2021Forcepoint.News Welcome to the Unbound EnterpriseUnderstanding the Need for the Unbound Enterprise Unbound Work Requires Unbound Security Getting to unbound depends on a corporate leadership Read More
31 Dec 2020Indeed Identity.News Roundtable: Evolution of Trust. Get ready for PKI 2.0In the digital era, PKI is one of the most effective technologies for authentication of users and devices that is used by worldwide companies for Read More
30 Dec 2020Checkmarx.News Preventing Developer Burnout in the Age of Rapid Software DeliveryThis increased pace and immense pressure surrounding software development have made burnout an even bigger reality than before, at a time when Read More
30 Dec 2020Cofense.News Emotet is Back for the Holidays with Updated TacticsAfter a lull of nearly two months, the Emotet botnet has returned with updated payloads. The changes are likely meant to help Emotet avoid Read More
29 Dec 2020BeyondTrust.News.Webinars 15 Most Popular Cybersecurity Webinars of 2020: BeyondTrust Edition | BeyondTrust15 Most Popular Cybersecurity Webinars of 2020: BeyondTrust Edition | BeyondTrust December 28, 2020 Open You May Also Be Interested In: Our Read More
29 Dec 2020News.Qualys Qualys Security Advisory: SolarWinds / FireEyeQualys Researchers found Millions of devices exposed to vulnerabilities used in the stolen FireEye Red Team tools and SolarWinds Orion by Read More
27 Dec 2020News.Press releases.ThreatQuotient Know More about the Impact of the SolarWinds Breach on your Environment with ThreatQKnow More about the Impact of the SolarWinds Breach on your Environment with ThreatQ ROSS HAMMER With the recent compromise announcement from Read More
27 Dec 2020News.Versasec The Popular vSEC:TOOL K-Series is Now Available in the Microsoft StoreNow available in the Microsoft Store, vSEC:TOOL K-Series Helps Users Evaluate PKI credential rollout plans. Apple started their App Store 12 Read More
26 Dec 2020Forcepoint.News.Webinars Grant Thornton – Insider Threat Q&AQ: As insider threat increases at an alarming rate, it continues to be one of the most challenging problems for organizations to solve. Do you Read More
24 Dec 2020Carbon Black.News Enterprise EDR Expands New Linux Coverage to SUSE, OpenSUSE, Ubuntu, Oracle & Amazon LinuxVMware Carbon Black is pleased to announce an exciting expansion of Linux distribution coverage for Enterprise EDR users on the VMware Carbon Read More
24 Dec 2020Gartner.McAfee.News Finally, True Unified Multi-Vector Data Protection in a Cloud WorldAccording to a report by Gartner earlier in 2020, 88% of organizations have encouraged or required employees to work from home. And a report from Read More
23 Dec 2020Checkmarx.News 2020 Checkmarx Partner Awards – APJ, EMEA & LATAM2020 has been a year like no other and it has certainly demonstrated just how creative, determined, and committed our partners are as they have Read More
23 Dec 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week ending December 18, 2020Cofense solutions enable organizations to identify, analyze and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More
22 Dec 2020BeyondTrust.News Least Privilege Application Management – A Lesson Learned from SolarWinds Orion | BeyondTrustLeast Privilege Application Management – A Lesson Learned from SolarWinds Orion | BeyondTrust December 22, 2020 Open You May Also Be Read More
22 Dec 2020News.Qualys Adobe Flash Player Reaches End of Life on December 31, 2020In July 2017, Adobe announced that Adobe Flash Player will reach “End of Life” (EOL) on Thursday, December 31, 2020. After this date, Adobe Flash Read More
21 Dec 2020McAfee.News 3 Reasons Why Connected Apps are Critical to Enterprise SecurityWhat are Connected Apps? Collaboration platforms such as Office 365 enable teams and end-users to install and connect third-party Read More
20 Dec 2020News.ThreatQuotient Focusing the SOC on Detection and ResponseThreat Intelligence is the Foundation and Lifeblood of the Security Operations Center We all know the security industry mantra: it’s not a Read More
20 Dec 2020FireEye.News Direct Access to Threat Intelligence With Mandiant AdvantageOur customers and partners have been asking for an easier way to stay informed of threat intelligence announcements. To address this need, Read More
20 Dec 2020News.Versasec Interview with DigiCert. What does the future of PKI look like? Why are DigiCert ONE and Versasec vSEC:CMS such a great fit?Date: 2020-12-18Author: Anders Adolfsson, Versasec Technical Consultant Previous << Team Building in the time of Covid Versasec integrates Read More
20 Dec 2020Allied Telesis.News Public Wi-Fi Security Best PracticesThe common experience of public Wi-Fi is usually frustrating and unreliable due to the cumbersome and repetitive authentication process. In Read More
19 Dec 2020Forcepoint.News.Webinars Understanding Negative Workplace Behaviors (and What You Can Do About it)At some point, we all behave in ways that expose organizations to risk. Negative workplace behaviors contribute to organizational risk, as these Read More
19 Dec 2020News.Opentext Navigating business recovery with AIWith the dramatic changes brought on by COVID-19, businesses are having to adapt to remote working, reduced budgets, and Read More
19 Dec 2020Centrify.News Centrify goes 3-for-3 as a PIM Leader in 2020This week, The Forrester Wave™: Privileged Identity Management, Q4 2020 report was published and Centrify was named a Leader among the 10 Read More
18 Dec 2020FireEye.News DebUNCing Attribution: How Mandiant Tracks Uncategorized Threat ActorsMany people are hearing the term UNC for the first time after we published details of a threat group we refer to as UNC2452. “UNC” groups—or Read More
18 Dec 2020News.Riverbed Bandwidth Cost vs. App Performance | Enterprise SD-WAN Trade-Offs | RiverbedSD-WAN makes it easy to incorporate less-costly bandwidth options like Internet Broadband and LTE at remote locations. What are the Read More
18 Dec 2020News.Riverbed Bandwidth Cost vs. App Performance | Enterprise SD-WAN Trade-Offs | RiverbedSD-WAN makes it easy to incorporate less-costly bandwidth options like Internet Broadband and LTE at remote locations. What are the Read More
18 Dec 2020Micro Focus.News INSPIRE 20 Podcast: Putri Realita, DanoneToday, we are sharing one last excellent INSPIRE 20 podcast before our team takes a well-deserved holiday break – and we hope you enjoy the same! Read More
17 Dec 2020Indeed Identity.News Pacific Tech and Indeed Identity announce strategic partnershipPacific Tech and Indeed Identity enter into a partnership that brings together Indeed Identity cutting-edge cybersecurity products and Pacific Read More
17 Dec 2020McAfee.News How OCA Empowers Your XDR JourneyXDR Promise Let’s start with an understanding of XDR. There is a range of XDR definitions but at the end of day there are core desired Read More
16 Dec 202016 Dec 2020Netwrix.News.Vendors Data Security in 2021: Lessons Learned Looking Back and What to Expect Looking ForwardLive Webinar on Thursday, December 17 at 10am GMT/11 am CET. No one has a crystal ball that reveals exactly what data security challenges we’ll Read More
16 Dec 2020FireEye.News Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST BackdoorExecutive Summary We have discovered a global intrusion campaign. We are tracking the actors behind this campaign as UNC2452. FireEye discovered Read More
16 Dec 202016 Dec 2020Group-IB.News.Vendors Egregor ransomware: white paper & webinarRegardless of how big or protected your company may be, ransomware remains a very real threat. Egregor, a ransomware family that appeared just in Read More
16 Dec 2020Checkmarx.News 2021 Software Security Predictions: Our Experts Weigh InNevertheless, with all of the adjustments that took place, the world of cyber attacker vs. cyber defender did not change much, other than the Read More
16 Dec 2020Cofense.News Strategic Analysis: Agent Tesla Expands Targeting and Networking CapabilitiesThreat actors who transition to this version of Agent Tesla gain the capability to target a wider range of stored credentials, including those Read More
15 Dec 2020Forcepoint.News.Webinars Indicators of Behavior (IOBs) – With 2020 VisionQ: How are Indicators of Behavior different than Indicators of Compromise?A: It is important to look at Indicators of Behavior because we, as an Read More
15 Dec 2020BeyondTrust.News Remote Support for Zebra Mobile Devices | BeyondTrustRemote Support for Zebra Mobile Devices | BeyondTrust December 14, 2020 Open You May Also Be Interested In: Our website uses cookies to provide a Read More
15 Dec 2020News.Qualys FireEye Breach Leveraged SolarWinds Orion SoftwareOn December 8, 2020, FireEye disclosed theft of their Red Team assessment tools. FireEye has confirmed the attack leveraged trojanized updates to Read More
14 Dec 2020Gartner.McAfee.News 10 Reasons to Celebrate 20201. January 2020 Gartner Peer Insights VOC Customers’ Choice for CASB Everyone deserves a break after surviving this past year and I Read More
13 Dec 2020News.Press releases.ThreatQuotient The Evolution of Threat Intelligence PlatformsThe Evolution of Threat Intelligence Platforms CYRILLE BADEAU Initially designed to compensate for the heterogeneity and volume of external Read More
12 Dec 2020Forcepoint.News.Webinars Next Week – Hear from Cybersecurity Industry Leaders at Forcepoint Exchange: Futures and InsightsIt’s time to get ahead Forcepoint Exchange: Futures and Insights Join sessions ‘A Necessary Change in the Data Protection Mindset’ and ‘Slackers, Read More
12 Dec 2020News.Opentext OpenText funds 4 million meals this holiday season2020 has been a most challenging year, and food insecurity has dramatically increased over the last year globally. In Canada alone: 2 Million Read More
11 Dec 2020FireEye.News FireEye Shares Details of Recent Cyber Attack, Actions to Protect CommunityFireEye is on the front lines defending companies and critical infrastructure globally from cyber threats. We witness the growing threat Read More
11 Dec 2020Ivanti.News December Patch Tuesday 2020For all of you who have asked for a pause to Patch Tuesday, you did not get exactly what you wanted for Christmas, but close. December Patch Read More
11 Dec 2020Micro Focus.News Amazing Grace Hopper – HAPPY BIRTHDAYWhen a bright, 30-something persuaded the authorities to waive the restrictions on age and weight, and joined the US Navy in 1944, no-one could Read More
10 Dec 2020Carbon Black.News Protect Yourself from Holiday Cyber Threats – Ask the Howlers, Episode 16 HighlightsIn episode 16 of “Ask the Howlers,” host Stacia Tympanick, senior solution engineer, met up with Ryan Hendricks, staff architect and Read More
10 Dec 2020McAfee.News Securing Containers with NIST 800-190 and MVISION CNAPPAs more enterprises adapt to cloud-native architectures and embark on multi-cloud strategies, demands are changing usage patterns, processes, and Read More
9 Dec 2020FireEye.News Unauthorized Access of FireEye Red Team ToolsOverview A highly sophisticated state-sponsored adversary stole FireEye Red Team tools. Because we believe that an adversary possesses these Read More
9 Dec 2020Checkmarx.News Seven Ways We’ve Helped our Partners Transform to Digital Reality During COVIDAmong organizations that experienced a sudden and dramatic interruption to “business as usual” were the many resellers that market software Read More
9 Dec 2020Cofense.News You Must Quarantine! Fake Office 365 Email Leads to CuriosityThe Cofense Phishing Defense Center (PDC) has discovered a recent phishing campaign that has targeted Office 365 users and includes a convincing Read More
8 Dec 2020Forcepoint.News Zero Trust Network Access (ZTNA) Replaces Implicit Trust with Explicit TrustCloud applications were no problem for newly remote workers to get to (which provided a lot of motivation to switch to SaaS apps where possible). Read More
8 Dec 2020BeyondTrust.News Demystifying Azure PIM: What it is, How it Works, What it Doesn’t Do | BeyondTrustDemystifying Azure PIM: What it is, How it Works, What it Doesn’t Do | BeyondTrust December 7, 2020 Open You May Also Be Interested In: Our Read More
7 Dec 2020Micro Focus.News Escape Endless Implementation with Micro Focus Enterprise Service ManagementCompanies are relying on Service Desks more than ever in this pandemic. More employees are working from home and do not have access to their Read More
6 Dec 2020News.Press releases.ThreatQuotient The ThreatQ Platform: Powering the XDR MovementThe ThreatQ Platform: Powering the XDR Movement MARC SOLOMON In my previous blog, I talked about the integration imperative for Extended Read More
6 Dec 2020FireEye.News Protecting Healthcare and Academia Against Cyber ThreatsAs the COVID-19 pandemic continues, cyber threats have worsened for several industries across the globe. Universities with medical and research Read More
6 Dec 2020News.Versasec Versasec at APEX 2020Date: 2020-11-30Author: Joakim Thorén, CEO Previous << Expand WHfB We are excited to be a part of the annual Apica Performance Excellence Read More
5 Dec 2020Forcepoint.News Automated Forcepoint NGFW High Availability with Azure Resource ManagerThis is why Forcepoint developed an Azure Resource Manager template which deploys a redundant stack of Forcepoint Next Generation Firewall Read More
5 Dec 2020News.Opentext The Future of Cyber Resilience—Enfuse On Air 2020The Future of Cyber Resilience – Click Here to View the Keynote OpenText’s 20th annual Enfuse conference—the cybersecurity and Read More
4 Dec 2020News.ThreatMark ThreatMark named in the RegTech100We’re proud to announce that ThreatMark has been included in the RegTech100 for 2021. The 2021 RegTech100 is launched by specialist research firm Read More
4 Dec 2020FireEye.News Informed Decision Making Regardless of the Tools or Controls in UseThe cyber security industry has been its own enemy as each security vendor focuses on their own specific toolset and unique detection algorithm, Read More
4 Dec 2020Micro Focus.News INSPIRE 20 Podcast: Anna Mok, Ascend LeadershipHappy Monday, and welcome back from the Thanksgiving holiday, for all of our US friends that celebrated! We are kicking the week off feeling Read More
3 Dec 2020Carbon Black.News A Look Ahead: 9 Cybersecurity Predictions for 2021Following an unprecedented year, what’s to come for cybersecurity in 2021? The ripple effects of the global pandemic have created a new Read More
3 Dec 2020McAfee.News Think Beyond the Edge: Why SASE is Incomplete Without Endpoint DLPOrganizations have been in the midst of digital transformation projects for years, but this development represented a massive test. Most Read More
3 Dec 2020News.Riverbed Speed CAD File Downloads | Improve CAD Application Performance | RiverbedWhy design professionals at architectural, engineering, construction and related firms struggle with running CAD applications remotely—and how to Read More
2 Dec 2020FireEye.News Using Speakeasy Emulation Framework Programmatically to Unpack MalwareAndrew Davis recently announced the public release of his new Windows emulation framework named Speakeasy. While the introductory blog post Read More
2 Dec 2020Checkmarx.News How Agencies Can Take Advantage of DevSecOps and Automation to Accelerate ATOsTo discuss how agencies can take advantage of DevSecOps, while meeting their ATO and security requirements in the same timely fashion, Checkmarx Read More
2 Dec 2020News.PROFITAP Preventing Network Downtime during Black FridayThe shopping spree starting on Black Friday, rolling over to Cyber Monday is one of the most critical times for Logistics centers, optimized Read More
2 Dec 2020Cofense.News The New Cofense Resource CenterToday, Cofense officially launched its new Resource Center. Formerly known as Community, the new Resource Center features a completely redesigned Read More
1 Dec 2020BeyondTrust.News Is Your Remote Access Strategy Adapted for the New Normal? | BeyondTrustIs Your Remote Access Strategy Adapted for the New Normal? | BeyondTrust November 30, 2020 Open You May Also Be Interested In: Our website uses Read More
1 Dec 202021 Jan 2021I4P.News Noreg – new i4p reselling partnerWe’re delighted to welcome one of the best known IT security integrators on the Hungarian market Noreg as an i4p reselling partner. We’ve Read More
1 Dec 2020News.Qualys Qualys Research Nominated for Pwnie Awards 2020The Qualys Security Advisory team has been nominated for five Pwnie Awards this year in three different categories. In addition to nominations Read More
29 Nov 2020News.Niagara Networks SecOps Blind sighted!?Privacy, both in the physical and online world, is one of the things most people value dearly. With the inevitable shift from physical locations Read More
29 Nov 2020FireEye.News A Look Back and a Look Forward: Cyber Security in 2021With 2020 coming to an end, we’ve released our 2021 cyber security predictions report, videos with our senior leaders and more. I asked Major Read More
28 Nov 2020News.Opentext 10 Reasons to upgrade OpenText Content Suite and Extended ECMReason #1: Cloud Editions In a recent Forrester Consulting Study, it was revealed that 64% of organizations that store all their content Read More
27 Nov 2020News.ThreatMark ThreatMark Recognized in Deloitte’s Top Technology Fast 50 for Central EuropeThreatMark has been included in Deloitte’s 2020 Technology Fast 50 CE – list honoring the most innovative and fastest-growing technology Read More
27 Nov 2020FireEye.News FireEye Options for Symantec CustomersCustomers of Symantec enterprise solutions continue to feel the impact of Broadcom’s acquisition. After Broadcom discontinued Symantec Endpoint Read More
27 Nov 2020Micro Focus.News GreenLight Group’s GITOpS – what is it and why does it matter?What is GITOpS (and why does it matter)? Operations is the lifeblood of every IT department, and for most IT managers it’s also the bane of their Read More
26 Nov 2020Carbon Black.News 3 Ways to Hunt for the ZeroLogon Vulnerability on Your Windows ServersVulnerability assessment and patch management can be painful time-consuming processes. From the Security team looking at vulnerability reports Read More
25 Nov 2020FireEye.News Election Cyber Threats in the Asia-Pacific RegionIn democratic societies, elections are the mechanism for choosing heads of state and policymakers. There are strong incentives for adversary Read More
25 Nov 2020Checkmarx.News Drupal Core: Behind the VulnerabilityThis article covers the technical facets of CVE-2020-13663 that were made public by Checkmarx in June 2020, but whose details were never Read More
25 Nov 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week ending November 20, 2020Cofense solutions enable organizations to identify, analyze and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More
24 Nov 2020News.Titus 7 technologies to help your business with GDPR complianceTeam Titus · Monday, November 23rd, 2020 In today’s global economy, businesses must be compliant with standards established by various Read More
24 Nov 2020BeyondTrust.News How Do the 10 Top Privileged Identity Management (PIM) Vendors Stack Up? See Evaluation & Ranking | BeyondTrustHow Do the 10 Top Privileged Identity Management (PIM) Vendors Stack Up? See Evaluation & Ranking | BeyondTrust November 19, 2020 Open You Read More
23 Nov 2020McAfee.News What Truebill and Other Financial Apps Have in Common With EDRThen I got to thinking about these new apps that I can’t imagine why anyone would need to use – UNTIL I decided to try Read More
22 Nov 2020News.Press releases.ThreatQuotient The Integration Imperative for XDRThe Integration Imperative for XDR MARC SOLOMON In my previous blog, I talked about the need for a conduit between Extended Detection and Read More
22 Nov 2020FireEye.News FireEye is the Intelligent Choice for Symantec ReplacementStop breaches in their tracks Each desktop, laptop and server is a possible entry for a breach, leaving your data, customer information and Read More
21 Nov 2020Forcepoint.News There’s Still Time to Register for Next Week’s SD-WAN and SASE SummitLike other events over the last several months, this year’s Summit has gone fully digital so you can attend no matter where you are based. SD-WAN Read More
21 Nov 2020News.Opentext Why innovation must be the new reality for government IT from January 2021 It’s almost ten years since the failed launch of healthcare.gov. This event served to cruelly expose what Read More
21 Nov 2020Centrify.News Ping and Centrify – Layering Identity Security Into DevOps [Webinar November 18]As has been well documented, security is often not the main focus for DevOps. The restrictions created by traditional methods of securing Read More
20 Nov 2020FireEye.News Purgalicious VBA: Macro Obfuscation With VBA PurgingMalicious Office documents remain a favorite technique for every type of threat actor, from red teamers to FIN groups to APTs. In this blog post, Read More
20 Nov 2020Micro Focus.News Smart changes in storeIntroduction A recent Forbes article commented, “COVID-19 will be remembered for many things and what’s becoming indisputable is how it is Read More
19 Nov 2020cPacket Networks.News cPacket Networks Deepens Cloud Offering with AWS Gateway Load BalancerThe post cPacket Networks Deepens Cloud Offering with AWS Gateway Load Balancer appeared first on cPacket Networks.Read More
19 Nov 2020Carbon Black.News VMware Carbon Black Announces Splunk Integration to Streamline and Modernize SOC WorkflowsIntroducing Unified VMware Carbon Black Cloud App for Splunk At VMware Carbon Black, our ecosystem of integration and alliance partners has Read More
19 Nov 2020Gartner.McAfee.News McAfee MVISION Solutions Meet FedRAMP Cloud Security RequirementsThis FedRAMP Moderate designation is equivalent to DoD Impact Level 2 (IL2) and certifies that the McAfee solution has passed rigorous security Read More
18 Nov 2020FireEye.News Find and Verify Threats in Splunk Phantom With FireEye Detection On DemandThreats can and do come from everywhere, and every organization approaches security differently based on their needs, industry and environment. Read More
18 Nov 2020Checkmarx.News Apache Unomi CVE-2020-13942: RCE Vulnerabilities DiscoveredGiven that Unomi contains an abundance of data and features tight integrations with other systems, making it a highly desired target for Read More
18 Nov 2020News.Riverbed Maximizing Network and Application Visibility and Performance | RiverbedNow as most IT professionals will attest, that’s not an easy thing to do, especially in complex hybrid cloud environments. But that’s where Read More
18 Nov 2020News.Riverbed Maximizing Network and Application Visibility and Performance | RiverbedWhen I joined Riverbed in October 2019, one of my first priorities was to present a clear vision and strategy for the company going into 2020. Read More
18 Nov 2020Cofense.News Phish Found in Proofpoint-Protected Environments – Week ending November 13, 2020Cofense solutions enable organizations to identify, analyze, and quarantine email threats in minutes. 100% of the phish seen by the Cofense Read More
17 Nov 202021 Jan 2021I4P.News i4p’s participation at RISK 2020It was a pleasure to have participated at REAL security’s RISK conference 2020. This leading IT security event for the Adriatic region went Read More
17 Nov 2020Forcepoint.Gartner.News Forcepoint Recognized by Gartner for 4th Straight Year as a Visionary in Network FirewallsWe designed Forcepoint NGFW to help enterprises and government agencies securely connect their offices, branches, private clouds and other sites Read More
17 Nov 2020BeyondTrust.News Stop Ransomware Attacks like RYUK with a Preventative Endpoint Security Approach | BeyondTrustStop Ransomware Attacks like RYUK with a Preventative Endpoint Security Approach | BeyondTrust November 16, 2020 Open You May Also Be Interested Read More
17 Nov 2020News.Qualys An End-to-End Approach to Next-Gen Web Application and API SecurityIt was almost 10 years ago that Marc Andreessen wrote that software is eating the world. It is still true today, but I would be even more Read More
17 Nov 2020Centrify.News Simplifying Access to Servers Using Tools You Are Familiar WithProviding privileged access to servers can be challenging, given the requirements to both grant access to authorized IT staff as well as protect Read More
16 Nov 2020Gartner.McAfee.News SOCwise: A Security Operation Center (SOC) Resource to BookmarkMeet the SOCwise From Michael Leland, Technical Director of Security Operations, McAfee From the perspective of a ‘legacy SIEM’ guy I Read More
15 Nov 2020News.ThreatQuotient The Term “Threat Intelligence” is Poisoned. It Does Not Mean What You Think it Means.I’m guessing the creators of the movie The Princess Bride had no idea that Inigo Montoya’s quote – You keep Read More
14 Nov 2020Forcepoint.News Future Insights – The Rise of Insider Threat-as-a-ServiceWhen envisioning the threats to your organization, malicious nation states or greedy virtual thieves located halfway around the world might loom Read More
14 Nov 2020News.Opentext 5 Content Suite and Extended ECM highlights from OpenText World 2020OpenText™ World 2020 offered insights from leading experts to help rethink the challenges facing your business. Learn how to best harness Read More
13 Nov 2020FireEye.News A Global Reset: Cyber Security Predictions 2021For most of us, 2020 was one of the most challenging years in recent memory. We struggled to deal with big changes in our personal lives and were Read More
12 Nov 2020Carbon Black.News VMware Carbon Black Named a Finalist in the 2020 CRN Tech Innovator AwardsWe are proud to announce that CRN®, a brand of The Channel Company, has named VMware Carbon Black a finalist in the 2020 CRN Tech Innovator Read More
12 Nov 2020McAfee.News How CASB and EDR Protect Federal Agencies in the Age of Work from HomeMcAfee’s global network of over a billion threat sensors affords its threat researchers the unique advantage of being able to thoroughly Read More
11 Nov 2020Checkmarx.News Checkmarx Solutions Now Available for Purchase on AWS MarketplaceIn case you’re unfamiliar, AWS Marketplace is a curated, digital catalogue that helps customers around the globe find, buy, and use third-party Read More
11 Nov 2020Ivanti.News November Patch Tuesday 2020Microsoft has released updates resolving a total of 112 unique common vulnerabilities and exposures (CVEs) this month. This puts us back up over Read More
11 Nov 2020Cofense.News Variants of Emotet MalwareThe Cofense Phishing Defense Center (PDC) team has seen a resurgence in the number of Emotet variants in the past few months, with the majority Read More
10 Nov 2020BeyondTrust.News Service Accounts – Don’t Overlook this Hidden Privilege Access Risk | BeyondTrustService Accounts – Don’t Overlook this Hidden Privilege Access Risk | BeyondTrust November 9, 2020 Open You May Also Be Interested In: Our Read More
10 Nov 2020News.Qualys The Evolution of the Qualys Cloud PlatformThe global pandemic has upended everything, and in the cyber security world in particular it has highlighted the need for organizations to have a Read More
10 Nov 2020Centrify.News Ephemeral Tokens vs. IDs and Passwords: A Simple Choice for DevOps?Static IDs and passwords have been around for decades, and for all the talk about getting rid of them, big pockets remain. Sure, for human login Read More
8 Nov 2020FireEye.News Ransomware: The Threat We Can No Longer Afford to IgnoreCybercrime is a billion-dollar industry that is consistently evolving. Innovation is at the heart of these criminal acts—hackers and fraudsters Read More
7 Nov 2020Forcepoint.News IDG Study – Protecting the Human Side of CybersecurityEmployees are Remote, Data is Everywhere According to a recent survey conducted in May 2020 by IDG of over 100 IT leaders, one major problem is Read More
7 Nov 2020News.Opentext Boost your digital fitness for cyber resilience in 2020 – and beyondDuring this tumultuous year, digital tools have let us keep working even as we’ve shuttered once-busy office spaces, moved by the millions Read More
7 Nov 2020Centrify.News Externalizing Credential Management for ITOM and ITSMOver the years, a pretty simple causality has emerged that represents one of the most significant security risks for organizations: PRIVILEGED Read More
6 Nov 2020FireEye.News Malicious File Transfer: What You Need To Know About an Attacker’s Methods and Techniques To Protect Your Organization From MalwareOne of the most effective ways for threat actors to infiltrate a network’s defenses is through the use of malware. As I discussed in our Security Read More
6 Nov 2020Micro Focus.News Micro Focus is Strategically Winning!How do we measure how strategic we are to our customers? Micro Focus uses double-blind competitive benchmarking in order to gauge how well we are Read More
5 Nov 2020Carbon Black.News.Webinars Countering a Home Invasion: Modernizing Threat Hunting Best PracticesThe recently released VMware Carbon Black Global Incident Threat Report found that incidents of counter incident response (IR) are occurring in Read More
5 Nov 2020McAfee.News.Webinars SPOTLIGHT: Women in CybersecurityThe RSA Conference USA 2019 held in San Francisco — which is the world’s largest cybersecurity event with more than 40,000 Read More
5 Nov 2020Allied Telesis.News Technology Surges Due to COVID-19Technology in healthcare often refers to cutting-edge treatments, or advanced, top-of-the-line medical devices and procedures. The COVID-19 Read More
4 Nov 2020FireEye.News Live off the Land? How About Bringing Your Own Island? An Overview of UNC1945Through Mandiant investigation of intrusions, the FLARE Advanced Practices team observed a group we track as UNC1945 compromise managed service Read More
4 Nov 2020Checkmarx.News Erez Yalon: A Security Leader in the API EconomyTo spread awareness around API risks and encourage developer secure coding practices when using APIs, Erez Yalon, Checkmarx’s Director of Read More
4 Nov 2020Cofense.News At the User’s Expense: Threat Actors Weaponize Companies’ Employee Reimbursements During the PandemicWith the health crisis that is COVID-19, employees are dutifully working from home. While some already had home offices decked out with dual Read More
3 Nov 2020BeyondTrust.News Top Cybersecurity Trends tor 2021: The Hacking of Time, M/L Data Poisoning, AI Attacks, & More | BeyondTrustTop Cybersecurity Trends tor 2021: The Hacking of Time, M/L Data Poisoning, AI Attacks, & More | BeyondTrust October 27, 2020 Open You May Read More
3 Nov 2020News.Riverbed Network Visibility’s Impact on Performance, Productivity and Security | Federal Government IT Study | RiverbedEvery federal IT manager wants to deliver the best end-user experience for their employees and agency, including a reliable network Read More
2 Nov 2020Gartner.McAfee.News McAfee Named a Leader in the 2020 Gartner Magic Quadrant for CASBCloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and Read More
1 Nov 2020Gartner.News.Press releases.ThreatQuotient From the Trenches, Part 2: Working with Employees to Strengthen Security PostureFrom the Trenches, Part 2: Working with Employees to Strengthen Security Posture Liz Bush During COVID-19 and the shift to a remote work Read More
1 Nov 2020FireEye.News Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening, and ContainmentUPDATE (Oct. 30, 2020): We have updated the report to include additional protection and containment strategies based on front-line visibility and Read More
31 Oct 2020Forcepoint.News Cybercriminals Exploit Brazil’s PIX Instant Payment Platform in New Phishing AttackThe largest campaign we have uncovered, with over 4,000 phishing emails sent (and blocked by Forcepoint Email Security) on 21st October 2020, Read More
31 Oct 2020News.Opentext Join us for OpenText Enfuse On AirEnfuse On Air 2020 is the premier conference focused on prevention, detection and investigation of threats. Every Tuesday between November Read More
30 Oct 2020FireEye.News Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware ChaserThroughout 2020, ransomware activity has become increasingly prolific, relying on an ecosystem of distinct but co-enabling operations to gain Read More
30 Oct 2020Micro Focus.News Plotting your DX strategy in the new normalDX: Get Serious Have you seen the pandemic internet joke? It asks, “Who has driven Digital Transformation the most?” Options A and B are CEO and Read More
29 Oct 2020Carbon Black.News Cybersecurity Awareness Month: 2020 in RetrospectFor cyber defenders worldwide, 2020 has been unprecedented year. CISOs and their security teams have battled increased attack volumes and data Read More
28 Oct 2020FireEye.News Endpoint Security on the Developer HubGreat news: FireEye Endpoint Security is now available on the Developer Hub! Head over to the Developer Hub page now to explore the Endpoint Read More
28 Oct 2020Checkmarx.News Cybersecurity Awareness Month Week 4: Day in the Life, Software DeveloperWe’ve covered a lot of ground, but one area we haven’t hit on quite yet is the developer side of things. In today’s modern DevOps world, Read More
28 Oct 2020Cofense.News Purchase Order Phishing, the Everlasting Phishing TacticThe PDC team has seen a recent up-tick in legitimate Mimecast services being used as a vector for phishing campaigns found in environments Read More
27 Oct 2020News.Titus Budget-squeezed organizations face greater data security risksHow Titus and HelpSystems helps solve your data security needs Team Titus · Thursday, October 22nd, 2020 Organizations are more at risk Read More
27 Oct 2020Forcepoint.News Zero Trust Network Access (ZTNA): The cure for the common VPNVPNs and users don’t mix well That approach had been okay for small numbers of people working outside an office. But when everybody suddenly had Read More
27 Oct 2020BeyondTrust.News IT Security Leaders Share Scary Cybersecurity Tales & Cyberthreat Hobgoblins that Haunt their Sleep | BeyondTrustIT Security Leaders Share Scary Cybersecurity Tales & Cyberthreat Hobgoblins that Haunt their Sleep | BeyondTrust October 23, 2020 Open You Read More
27 Oct 2020News.Qualys NSA Alert: Chinese State-Sponsored Actors Exploit Known VulnerabilitiesOn October 20, 2020, the United States National Security Agency (NSA) released a cybersecurity advisory on Chinese state-sponsored malicious Read More
26 Oct 202026 Oct 2020News.RISK conference RISK 2020 letos v VIRTUALNI obliki!Spoštovani, vljudno vabljeni na največjo konferenco o informacijskim varnosti in novih tehnologijah v regiji Adriatik, RISK 2020, ki bo letos Read More
26 Oct 202026 Oct 2020News.RISK conference RISK 2020 this year in full VIRTUAL format!Dear, You are cordially invited to the largest conference on information security and new technologies in the Adriatic region, RISK 2020, which Read More
26 Oct 2020McAfee.News Data-Centric Security for the Cloud, Zero Trust or Advanced Adaptive Trust?Today, most entities utilize a multi-phased security approach. Most commonly, the foundation (or first step) in the approach is to implement Read More
25 Oct 2020Gartner.News.Press releases.ThreatQuotient Do Your Part to Stay Safe Online and Start Using a Password ManagerDo Your Part to Stay Safe Online and Start Using a Password Manager Aaron Louks Cybersecurity Awareness Month 2020 is about taking proactive Read More
25 Oct 2020FireEye.News Flare-On 7 Challenge SolutionsWe are thrilled to announce the conclusion of the seventh annual Flare-On challenge. This year proved to be the most difficult challenge we’ve Read More
24 Oct 2020Forcepoint.News Everything You Need to Know About the Cyber Voices Zero Trust SummitIf you’re a security leader for your organization, chances are good you’re at some point along a digital transformation journey that’s focused on Read More
24 Oct 2020News.Opentext OpenText World 2020—Are You Ready for the Great Rethink?The world is not changing. It has changed. These changes are deep. Structural. Lasting. We must use this opportunity to rethink on a massive Read More
23 Oct 2020FireEye.News Threats Targeting VoIP Networks as Usage Surges During PandemicInternet service providers are seeing a spike in Voice over Internet Protocol (VoIP) usage driven by the increased adoption of working from home Read More
23 Oct 2020Micro Focus.News INSPIRE 20 – mark my words! The importance of diverse tech innovationUKBlackTech All I can say about this week’s episode is WOW, Mark Martin, what an episode! Mark, a computer science teacher and founder of Read More
22 Oct 2020Carbon Black.News Crossing the Narrow SeaTom Kellermann, Head of Cybersecurity Strategy at VMware and Member of the Cyber Investigations Advisory Board of the United States Secret Read More
22 Oct 2020McAfee.News The Deepfakes Lab: Detecting & Defending Against Deepfakes with Advanced AIDeepfakes began to gain attention when a fake pornography video featuring a “Wonder Woman” actress was released on Reddit in late Read More
21 Oct 2020FireEye.News The Inception of Mandiant AdvantageOur customers expressed a desire for faster access to our intelligence to focus on threat activity that matters to them, so we launched Mandiant Read More
21 Oct 2020Checkmarx.News Cybersecurity Awareness Month Week 3: Day in the Life, AppSec EducatorIn the security industry, enough can’t be said about the need for spreading awareness. It’s the first, and most critical, step in spurring action Read More
21 Oct 2020Cofense.News Mandatory Internal Company Communications: The Best Time to PhishCompanies are awash with numerous corporate communications: open enrollment notifications, new policies and so forth. With this crush of Read More
20 Oct 2020BeyondTrust.News Understanding Authentication vs. Authorization | BeyondTrustUnderstanding Authentication vs. Authorization | BeyondTrust October 19, 2020 Open You May Also Be Interested In: Our website uses cookies to Read More
20 Oct 2020News.Qualys Qualys Policy Compliance Plugin for Jenkins Now AvailableVarious factors may introduce vulnerabilities in a product during its lifecycle, resulting in a drift from the required compliance status. Hence, Read More
19 Oct 2020News.ThreatMark Product Release 3.27 – Improved Bot detection, introduction to async large batch payments scoring, and the new ThreatMark AFS PanelThere’s been a lot of great work done by our team that just gets confined to our own company. Until now, we haven’t communicated out product Read More
19 Oct 2020Certgate Blurtooth Security Issue? AirID is safe!Blurtooth security vulnerability? AirID is safe – Blurtooth has no chance with AirID. Düsseldorf, 21.09.2020, certgate, one of Read More
18 Oct 2020News.ThreatQuotient Is Scaling a Pyramid on Your Bucket List? It Should BeThe concept of “The Pyramid of Pain” was first introduced by David J. Bianco in 2013. Today, most security professionals are familiar Read More
18 Oct 2020FireEye.News Windows Event Streaming Using FireEye Endpoint and HelixGathering Microsoft Windows event logs is a critical function of most SOCs. The wealth of information available on endpoints makes ingesting logs Read More
18 Oct 2020News.Versasec Versasec expands Windows Hello for BusinessDate: 2020-10-12Author: Anders Adolfsson, Versasec Technical Consultant Previous << VISA 1FA EMV In Microsoft Windows 10, Windows Hello for Read More
18 Oct 2020News.Riverbed Enabling Work-From-Anywhere | Application and Network Performance | RiverbedIn Part 1 and Part 2 of this blog series, we established that forward-thinking organizations are prioritizing technology investments to ensure Read More
17 Oct 2020Forcepoint.Gartner.News Future Insights – The Emergence of the Zoom of CybersecurityThis is the status quo today: We have all moved to remote working. Cloud deployment is a necessity. Digital transformation has happened—and where Read More
17 Oct 2020Indeed Identity.News Webinar: 5 coolest features every access management software should haveWhat if you’ve had one tool for managing access of employees and customers? Or a tool providing strong and multi-factor authentication with Read More
17 Oct 2020News.Opentext A little knowledge is a dangerous thing…In today’s world, everything moves so fast. Everyone wants something yesterday. Everyone demands and expects more from Read More
16 Oct 2020FireEye.News FIN11: Widespread Email Campaigns as Precursor for Ransomware and Data TheftMandiant Threat Intelligence recently promoted a threat cluster to a named FIN (or financially motivated) threat group for the first time since Read More
15 Oct 2020Carbon Black.News Ransomware Attacks Targeting Healthcare Surge: VMware Carbon Black experts Weigh inTargeted, sophisticated, and costly – over the past month, several high-profile ransomware attacks have been reported with a specific focus Read More
15 Oct 2020McAfee.News.Webinars “Best of Breed” – CASB/DLP and Rights Management Come TogetherEnter the cloud Most organizations now consider cloud services to be essential in their business. Services like Microsoft 365 (Sharepoint, Read More
14 Oct 2020FireEye.News Threat Found: Integrating With FireEye Detection On DemandThreats can and do come from everywhere, and every organization approaches security differently based on their needs, industry and environment. Read More
14 Oct 2020Checkmarx.News Cybersecurity Awareness Month Week 1: Day in the Life, Security ResearcherHave you ever wondered what a typical day looks like for a security researcher? If so, you’ve come to the right place! We’re kicking things off Read More
14 Oct 2020Cofense.News Security Awareness: Choosing Methods and Content that WorkLast week we examined the importance of setting a strategy and goals for your security awareness program. Part 2 in our 4-part series in support Read More
13 Oct 2020Forcepoint.News Shifting Gears from IOCs to IOBsThe after-the-fact nature of IOCs is one of their clearest limitations. They are documentation artifacts (hash of a file, reputation of an IP, Read More
13 Oct 2020BeyondTrust.News BeyondTrust Expands Cloud Leadership with Password Safe SaaS | BeyondTrustBeyondTrust Expands Cloud Leadership with Password Safe SaaS | BeyondTrust Join Us for Go Beyond – Our Virtual Customer Conference October Read More
11 Oct 2020Gartner.News.Press releases.ThreatQuotient ThreatQuotient Listed in Gartner’s 2020 Market Guide for Security Orchestration, Automation and Response SolutionsThreatQ platform’s data-driven approach to SOAR can free-up two to three full-time security analysts for higher level tasks Reston Va. Read More
11 Oct 2020FireEye.News Mandiant Executive Intelligence Briefing: Election Security EditionWith less than a month before the U.S. elections on Nov. 3, the race is on to protect the democratic process. Mandiant Threat Intelligence is Read More
11 Oct 2020Ivanti.News Coffee Talk With Ivanti Insiders on International Coffee DayName What is your favorite coffee drink? How do you take your coffee? What is your favorite fall/winter coffee drink? Favorite snack to have with Read More
10 Oct 2020Forcepoint.News Five Takeaways to Build a Resilient Cybersecurity Strategy1. Enable remote classified access With people as the new perimeter, cross domain solutions provide remote classified access, while Zero Trust Read More
10 Oct 2020News.Opentext Forrester: What to look for in cloud content management vendors This blog is co-authored by Alison Clarke and Sandi Nelson. Having the right partners by your side is crucial as your organization digitally Read More
9 Oct 2020FireEye.News Gartner: 5 Things You Must Absolutely Get Right for Secure IaaS and PaaSEvery organization is adopting the cloud in one way or another, and for good reason. The cloud offers many benefits, but it also comes with a new Read More
9 Oct 2020Micro Focus.News INSPIRE 20 – the secret diary of a security event crasher….Hacky-sec It’s time for one of my favorite days of the week – INSPIRE 20 podcast day! Today we are joined by the exceptional Tanya Janca, aka Read More
8 Oct 2020Carbon Black.News.Webinars Cybersecurity Awareness Month 2020: Top Resources on “If You Connect it, Protect it”Leaves are turning red and gold, the temperature is dropping, and the smell of pumpkin spice is filling the air. It’s officially October! Read More
8 Oct 2020McAfee.News MITRE ATT&CK for Cloud: Adoption and Value Study by UC Berkeley CLTCBackground Nearly all enterprises and public sector customers we work with have enabled cloud use in their organization, with many seeing a Read More
7 Oct 2020FireEye.News Introducing Mandiant Advantage: Threat Intelligence — Know the Threats That Matter Most To YouWhen it comes to cyber security, many organizations remain reactive. Cyber security becomes a top priority only when a breach occurs, or critical Read More
7 Oct 2020Checkmarx.News Expert Q&A on Securing Code in GitHub with CheckmarxWe sat down with Ken McDonald, Principal Integrations Engineer at Checkmarx, to learn more about how Checkmarx’s new GitHub Action works and how Read More
7 Oct 2020Armis.News 5 Questions CISOs Must Ask When Addressing the New WFH RealityIf you’re like me, your professional life has changed dramatically over the last six months and you’re likely working from home every day. Read More
7 Oct 20207 Oct 2020Armis.News Armis Recognized as a Leader in Connected Medical Device Security EvaluationWe are ecstatic that Armis has been named a Leader in The Forrester New Wave™: Connected Medical Device Security Q2 2020 report. Forrester Read More
7 Oct 2020Cofense.News Twelve Flavors of Phish: Canadian Workers Targeted With Fake Covid-19 Relief DepositsFinancial aid programs continue to be popular targets in the midst of the COVID-19 pandemic, with government relief grants a Read More
6 Oct 2020Forcepoint.Gartner.News Actionable Insights: The Disruption of Behavioral AnalyticsThe Broken Promise of Behavioral Analytics Dynamic User Protection IOB Overview Applied behavioral analytics have fallen short in terms of Read More
6 Oct 2020BeyondTrust.News Why Privilege Management is at the Center of Modern Endpoint Security | BeyondTrust3. Use Pragmatic Application Control & Block Malicious Code [Endpoint Privilege Management] By layering modern application control on top of Read More
6 Oct 2020News.Qualys Instrument VMware Virtual Machines for Security and ComplianceHow do you ensure Qualys is managing the security and compliance of all your VMware workloads? First, you need to have Qualys Cloud Agent Read More
5 Oct 2020McAfee.News McAfee Leapfrogs Competition with trio of awards at 2020 IT World AwardsThe IT World Awards are industry and peer recognitions from Network Products Guide honoring achievements of world’s best in organizational Read More
4 Oct 2020LOGbinder.News Today we revolutionize using Windows Event Collection at scaleWhat we are announcing today with Supercharger for Windows Event Collection reminds me of how far technology has come. I remember being so Read More
4 Oct 2020News.Press releases.ThreatQuotient.Webinars 5 Tips You Can Start Using Today to Reduce Business Risk5 Tips You Can Start Using Today to Reduce Business Risk POSTED BY ANDY GEPERT Cyber threat intelligence (CTI), risk management and privacy teams Read More
4 Oct 2020FireEye.News Back to School: The Cyber Workforce in 2020The cyber skills shortage is a real problem. There just aren’t enough qualified people to adequately meet the cyber security needs of all Read More
3 Oct 2020Forcepoint.News Our Cyber Voices Zero Trust Summit is Just a Few Weeks AwayIf you’re a business leader, a security executive or a security team lead or practitioner, you’ll leave this half-day virtual summit with a Read More
3 Oct 2020News.Opentext Running a resilient EIM platformInformation is key for businesses to operate and succeed, making it imperative that the Enterprise Informant Management platforms they rely on Read More
3 Oct 2020Centrify.News How to Empower the “Sec” in DevSecOpsIn this blog, I’m going to talk about Privileged Access Management (PAM) for security in a modern DevOps world. A very frustrating topic for Read More
3 Oct 2020News.Riverbed Perfect Forward Secrecy (PFS) API and SSL/TLS Analysis | AppResponse 11.10 | RiverbedKeeping track of SSL and TLS security certificates is important. An expired certificate can erode trust in your organization in that customers Read More