Prisma Access Is the Leading Cloud Service to Secure Remote Users (Palo Alto Networks)
We are excited that Prisma Access by Palo Alto Networks was the leading cloud-delivered security app by monthly active users, as well as by number of organizations.
How a successful phishing attack can hurt your organization
A successful phishing campaign can damage an organization in more ways than one. A report released Sunday by security provider Proofpoint looks at the impact of a phishing attack and offers tips on how to combat one.
DaaS simplicity for all Citrix Virtual Apps and Desktops service customers now available!
Citrix Virtual Apps and Desktops service customers now have the option to seamlessly deploy new DaaS workloads right from the Citrix Cloud console.
Edge 2.0 Manifesto: Redefining Edge Computing (F5)
In the Edge 2.0 era, digital business in every industry sector will adopt edge computing platforms to deliver applications and to process and analyze data. The edge platform will be an essential component of the user experience for all digital services.
FortiOS 7.0: Consistent Security Across All Networks, Endpoints, and Clouds (Fortinet)
This proliferation of new and unique edge environments has made today’s networks increasingly difficult to secure. Part of the reason is the rate of change. But the other is that much of this digital innovation has been piece-meal, without a unifying security strategy or framework.
Roses are red, violets are blue, cybercriminals are ready to come after you! (Check Point)
As people go online to purchase gifts for their loved ones during this period, Check Point Research (CPR) has observed a surge in malicious phishing email campaigns in the second half of January with over 400 malicious Valentine’s day themed individual phishing emails weekly.
Mandiant Advantage Delivers Free Confidence Scoring for Publicly-Known Indicators (FireEye)
Gathering open source threat feeds seems advantageous at first glance, yet the process of collecting, analyzing and curating thousands of indicators a day can quickly diminish the expected benefits—or worse, expose the organization to new risks when half-baked intelligence is produced.
Intel Squashes High-Severity Graphics Driver Flaws
Intel has issued fixes for five high-severity vulnerabilities in its graphics drivers. Attackers can exploit these flaws to launch an array of malicious attacks – such as escalating their privileges, stealing sensitive data or launching denial-of-service attacks.
Get Back to the Basics with Your Company’s Cybersecurity Practices (CyberArk)
While there is a multitude of straightforward technology benefits to be gained from the implementation of a UFFO platform, a more subtle yet equally as important benefit—investment protection—is critical to ensuring customer innovation happens continuously and without disruption.
Unified Storage Is Investment Protection (Pure Storage)
In an age of near-constant attacks, organizations can’t afford to get caught with “dirt under their fingernails.” And yet, lax or risky practices persist in many companies.