Google Issues Warning For 2 Billion Chrome Users
Google published the news in a new blog post, where it revealed Chrome’s 11th ‘zero day’ exploit of the year has been found (CVE-2021-37973) and it affects Linux, macOS and Windows users.
Citrix Workspace SAML 2.0 support is now generally available
With Citrix Workspace supporting SAML 2.0, you can seamlessly integrate users via Single Sign-On (SSO) with a broad range of identity and authentication providers, such as Google, Imprivata, Ping, and many more.
The Importance of an Agile Digital Infrastructure (Pure Storage)
Now is the time for organizations to throw traditional ideas about IT infrastructure out the window and start looking at technology as an agility enabler.
Data Breach Costs and Cloud Security Implications: 2021 (CyberArk)
With average breach costs spiking 10 to 20% higher than costs suffered by companies with Zero Trust strategies, can organizations really afford the price of inaction? Don’t wait to find out.
FireEye Network Security 9.1 Release is the Biggest Yet
The 9.1 release of FireEye Network Security is the biggest to date, with over 90 features and enhancements.
Is Your Security Stack as Adaptable as Your Business? (F5)
As devices move in and out of networks and users request access to applications from home or on-the-go, it’s the perfect setting for cybercriminals to expose users and corporate resources to threats like malware.
Microsoft LAPS Overview: Setup, Installation, and Security (Varonis)
Microsoft LAPS is one of the most effective ways to protect administrator passwords and prevent unauthorized users from accessing systems or data that they shouldn’t. Microsoft’s Local Administrator Password Solution — or LAPS for short — is a password management feature that randomizes administrator passwords across a single domain.
How Nexus People Risk Explorer Protects Organizations from Common Threats (Proofpoint)
Earlier this year, Proofpoint introduced Nexus People Risk Explorer to equip our customers with insight to build a people-centric cybersecurity strategy.
GriftHorse Money-Stealing Trojan Takes 10M Android Users for a Ride
More than 10 million Android users have been saddled with a malware called GriftHorse that’s trojanizing various applications and secretly subscribing victims to premium mobile services – a type of billing fraud that researchers categorize as “fleeceware.”
What Can We Learn From the Top Cloud Security Breaches? (Check Point)
Cybersecurity spending in 2020 did not keep up with the pace of digital transformation, creating even greater gaps in organizations’ ability to effectively address the security challenges introduced by public cloud infrastructure and modern containerized applications.
Fortinet Ransomware Survey Shows Many Organizations Unprepared (Fortinet)
We all need to do our part. And that starts by building an effective ransomware strategy, including critical security resources designed to address ransomware attack vectors. It's an action every organization needs to prioritize.