Don’t Let Cybersecurity Cracks Become Major Breaches (CyberArk)
By maximizing your endpoint security posture with a layered security approach, your organization can reduce risk and uncertainty and protect your digital “house”.
How to Mitigate an Accidental Insider Threat (Proofpoint guest blog)
Though malicious insider threats often get the most attention, they only comprise 14% of all insider threat incidents. Accidental insider threats, however, account for 62% of all incidents, costing organizations an average of $4.58 million, the most in total per year. Clearly, the greatest risk for any organization is also its greatest asset: its people.
IoT Attacks Skyrocket, Doubling in 6 Months
The first half of 2021 saw 1.5 billion attacks on smart devices, with attackers looking to steal data, mine cryptocurrency or build botnets.
Digital Transformation: Now is the time to be bold and ambitious (Citrix)
Fundamentally, we need to appreciate the importance of digital transformation. Now is not the time for IT leaders to be shying away from the opportunities available to them; rather, we need them to be bold and ambitious, asking for help where they need it, and push the boundaries of what is possible, to help their organisations and future careers, to flourish.
By the Numbers: Business Email Compromise a Major Boon to Threat Actors (Arctic Wolf)
In what has become known as business email compromise (BEC), cybercriminals have become increasingly adept at not only spoofing email addresses but taking over accounts altogether once they are compromised.
Gotham is hiring. See the link below for more information about our Technology Sales Account Manager - Outside Sales position.
Constrained Compute: The Case for Hardware Optimization at the Edge (F5)
Environments like edge need the power boost that comes from hardware-optimized compute. Whether it’s for use in manufacturing, where IIoT (Industrial Internet of Things) requires real-time processing of data with extremely low latency (less than 20ms), or in healthcare where the speed of processing for health data can mean the difference between life and death, hardware-optimized compute is a requirement.
10 Data Compliance Best Practices to Establish Today (Pure Storage)
Compliance and information security are closely intertwined, placing even more importance on data privacy compliance as a core pillar of every security strategy.
IGEL OS 11.06 Enables Amazon WorkSpaces Customers to Do More
IGEL and AWS have announced that IGEL OS 11.06 includes Amazon WorkSpaces 3.1.9 as an integrated solution. As trivial as this may sound, this is a milestone for remote work that helps solve a myriad of business challenges.
CISA releases advisory on Conti ransomware, notes increase in attacks after more than 400 incidents
CISA sent out an advisory on Wednesday centered around the Conti ransomware, providing detailed information for the cybersecurity community about the ransomware group and its affiliates.
We’re expanding our leadership team. Visit the link to learn more about our Microsoft Practice Director position.
Fortinet Named a Leader, Placed Highest in Ability to Execute in the Gartner® Magic Quadrant™ for WAN Edge Infrastructure
With over 34,000 WAN Edge customers, organizations across all industries and verticals trust Fortinet to address their challenges in transforming and securing their WAN.
Large-Scale Phishing-as-a-Service Operation Exposed
The turnkey platform allows users to customize campaigns and develop their own phishing ploys so they can then use the PhaaS platform to help with phishing kits, email templates and hosting services needed to launch attacks.
We’re expanding our leadership team. Visit the link to learn more about our Cybersecurity Practice Director position.