Your Blueprint to Implement an Insider Threat Management Program (Proofpoint)
Organizations need to adopt a new mindset to efficiently adapt to this new normal, one that enables a transformation of their insider threat management strategies. It starts by understanding the insider threat risk.
Service Continuity in Citrix Cloud: A recipe for resiliency
Citrix admins can put service continuity to the test and proceed with enabling it in their production environment. If you’re leveraging Citrix Workspace and Citrix Gateway service or Citrix Workspace and internal connections, service continuity will help ensure employees can stay productive, even during outages.
Break the Bias and Create a More Diverse and Inclusive Cybersecurity Workforce (Fortinet)
To change this perception and get out ahead of the cybercrime crisis we all face, we must bring more voices, perspectives, and diversity to our cybersecurity teams.
How to Put CISA’s “Shields Up” Recommendations Into Action (Pure Storage)
In the face of mounting cyber threats, the Cybersecurity & Infrastructure Security Agency (CISA) has issued guidance for organizations to bolster their cybersecurity defenses.
The Case for Building Identity Security into Enterprise UX Design (CyberArk)
If user-centric Identity and Access Management (IAM) protections aren’t integrated tightly into enterprise software design, overall product security and quality will likely suffer.
Prisma Cloud Supply Chain Security Reduces Code Complexity and Risk (Palo Alto Networks)
With our latest release, Prisma Cloud now provides an automatic inventory and visualization of your cloud native supply chain. This provides quick visibility into the software bill of materials, connections between components and code pipelines that make up your cloud native applications.
Google To Buy Incident Response Superstar Mandiant For $5.4B
Google believes Mandiant will bring real-time and in-depth threat intelligence gained from working with the largest organizations in the world on the frontlines of cybersecurity.
Top Cyber Attacks of February 2022 (Arctic Wolf)
The importance of businesses, governments, and other organizations protecting vital systems and sensitive data has never faced such a stark context.
Smartphone malware is on the rise, here's what to watch out for
Cybersecurity researchers warn of a 500% surge in mobile cyberattacks as hackers try to steal passwords, bank details and even take full control of smartphones.
CrowdStrike and Cloud Security Alliance Collaborate to Enable Pervasive Zero Trust
Our work with the Cloud Security Alliance and our partners Zscaler and Okta will build on this foundation and accelerate the deployment of comprehensive Zero Trust industry standards that set up customers for success in enforcing a “Trust No One, Verify Always” approach to securing an increasingly complex threat environment.
Qakbot Botnet Sprouts Fangs, Injects Malware into Email Threads
The ever-shifting, ever-more-powerful malware is now hijacking email threads to download malicious DLLs that inject password-stealing code into webpages, among other foul things.