Make Internet Access Safe - Adopt Zero Trust Network Security! (Palo Alto Networks)
As applications move to the cloud and users work from anywhere, securing internet access has moved to the forefront in the battle against cybercriminals.
5 White House Recommendations for Modern Data Protection Against Ransomware (Pure Storage)
In response to these increasing cyber threats, the White House recently raised ransomware to the top of the national security agenda, issuing a bluntly worded warning for American businesses to take urgent security measures to protect against attacks.
Microsoft says its customer support tools were compromised by the SolarWinds hackers
Microsoft says some of its customer support tools were accessed by the hacking group Nobelium, which was also connected to the separate SolarWinds attack, due to a Microsoft customer service agent’s computer being compromised.
Citrix brings new enhancements to its simplified DaaS service
Now Citrix adds enhanced monitoring and management features to Citrix Virtual Apps and Desktops Standard for Azure to make it even easier to manage and monitor your DaaS environment.
Using Tech for Social Good (F5)
Begun last year, these annual grants are aimed at helping nonprofits invest in the technologies they need to build the strength and efficiency of their organizations.
ReConnect – Meet DatAdvantage Cloud (Varonis)
Varonis introduced an exciting new cloud-hosted solution that brings our data-centric security approach to AWS, Box, GitHub, Google Drive, Jira, Okta, Salesforce, Slack, and Zoom!
Cyberattacks and threats continue to break records, warns Check Point Research
Check Point Research (CPR) warns of a further increase in cyberattacks and notes that more nation-state weapons are being leaked enabling potential hackers to carry out sophisticated attacks.
Enabling the Convergence of Networking and Security (Fortinet)
Due to an increasing number of devices and cloud applications being employed by individual users each day, bolstering security across all endpoint and network edges has become more important – and complex – than ever before.
5 Things To Know About Microsoft’s Windows 11 Security Strategy
Microsoft is moving to a zero trust security approach across all of its platforms, including with stringent Windows 11 CPU requirements.
A 'Colossal' Ransomware Attack Hits Hundreds Of U.S. Companies, A Security Firm Says
The criminals targeted a software supplier called Kaseya, using its network-management package as a conduit to spread the ransomware through cloud-service providers.
Solving Performance Issues with Anti-Malware Exclusions
IT administrators need to find a balance between a malware-free environment and affecting the reliability and performance of any applications or services.
The Click-Down: Zero trust network access (ZTNA) and Citrix
With a zero trust architecture, no one is trusted by default and users are adaptively granted access based on contextual awareness using patterns around identity, time, and device posture.
6 Important Best Practices for Preparing for Data Breaches and Security Incidents (Fortinet)
The National Institute of Standards and Technology has identified several critical steps for managing a cybersecurity event as part of the NIST Cybersecurity Incident Response Process, and this should be part of every organization’s cybersecurity strategy.
How Do You Get Safer Data in the Real World? (Pure Storage)
By enabling organisations to augment existing data backup infrastructure rather than replacing it, Pure FlashBlade enhances infrastructure already in place with additional data-loss prevention and cyber-protection features.
Hybrid AI: A Better Model for Leveraging Machine Learning and Human Expertise (Arctic Wolf)
One of the biggest advantages of AI in cybersecurity is the capability to quickly handle massive amounts data to detect patterns and anomalies that may otherwise go undetected.
81 Ransomware Statistics, Data, Trends and Facts for 2021 (Varonis)
Ransomware attacks are on the rise and continue to be a disruptive force in the cybersecurity industry, affecting everything from financial institutions to higher education. Due to the rise in remote work prompted by the pandemic, attacks are up 148%.
IGEL + Citrix®: Incredible Things Happen with the Perfect Partnership
With Citrix Workspace, Citrix Cloud services and IGEL OS at the endpoint, enterprises can securely deliver all the tools their employees need—SaaS apps, web apps, virtual apps and more—while simplifying IT management and speeding up deployment.
Three Simple Methods to Secure Your Enterprise IoT Devices (Check Point)
It’s no secret that most IoT devices represent security breaches just waiting to happen. And the landscape is changing. In December 2020, the U.S. passed the IoT Cybersecurity Improvement Act demanding better, tighter standards for IoT devices. This is an important step, acknowledging the serious threat these devices pose.
Scam artists exploit Kaseya security woes to deploy malware
On July 8, the software solutions provider said that scam artists are leveraging the security incident to "send out fake email notifications that appear to be Kaseya updates." “These are phishing emails that may contain malicious links and/or attachments,” the company added.