What’s new and next with Citrix Virtual Apps and Desktops: Q&A (Citrix)
With our updates on the Long-Term Service Release (LTSR), optimizing unified communications platforms, security enhancements, and more, there are a number of enhancements we want to dive deep into.
Cracks forming in the ransomware ecosystem (Check Point)
Thanks to the efforts of white hat researchers and security specialists, as well as governments around the world now strengthening their security posture and taking a more proactive approach, cracks in the ransomware ecosystem are now starting to appear.
How to Build a Sustainable Security Culture That Drives Behavior Change (Proofpoint)
A couple of hours of training annually won’t prompt most users to adopt a security mindset for the long term. Building a robust security culture will.
Bad Actors Are Maximizing Remote Everything
Enterprises must take a work-from-anywhere approach to their security. They need to deploy solutions capable of following, enabling and protecting users no matter where they are located. They need security on the endpoint (EDR) combined with?zero trust network access (ZTNA) approaches.
5 Most Disruptive Vulnerability Types (Arctic Wolf)
Organizations everywhere struggle with the complexity of identifying, prioritizing, and managing security risks within their environment—all while these risks pile up, leaving organizations vulnerable to threats and damaging data breaches. If it sounds like a task too daunting to tackle, it might be time to turn to a security operations solutions provider.
You’ve Got Privileged Access Management… But Can You Keep Secrets Secure? (CyberArk)
While cyber attacks can be inevitable, damage and disruption are not. Organizations that take a privilege-centric approach to securing identities — both human and machine — are better positioned to stop attackers from reaching valuable assets and data.
Ensuring Strong Cyber Hygiene on World Password Day (Fortinet)
World Password Day is a reminder for users to update weak or old passwords to ensure the security of personal and corporate information. As cyber threats continue to evolve and bad actors develop new attack techniques, a good cybersecurity posture requires more than just a strong password to avoid compromise.
Ransomware Attacks Surged By 37 Percent In 2021: Sophos Survey
Ransom payments increased five-fold to an average $812,360 last year, the survey finds.
Check Point Software Outlines Five Must-Haves for Creating a Secure Password (Check Point)
Check Point Software Technologies is raising awareness of the most common mistakes made by users when creating and managing passwords, offering practical advice on how to keep private data protected.
Protect Microsoft 365 with Pure and Veeam (Pure Storage)
Many organizations use software-as-a-service offerings like Microsoft 365. Veeam and Pure Storage provide fast recovery and protection from cyber threats for this critical data.
F5 Warns of Critical Bug Allowing Remote Code Execution in BIG-IP Systems
Application service provider F5 is warning a critical vulnerability allows unauthenticated hackers with network access to execute arbitrary commands on its BIG-IP systems.