Behavioral Analysis and AI/ML for Threat Detection: Going Behind the Scenes on the Newest Detection Engine from Proofpoint (Proofpoint)
The new Supernova Behavioral Engine improves our already leading efficacy, while ensuring low false positives for customers. We’re also committed to transparency, especially given how much vendor noise there is around the use of AI/ML.
What Is SQL Injection? Identification & Prevention Tips (Varonis)
Applications tend to be at risk of high-profile vulnerabilities like SQL injection attacks. The results of a SQL injection attack vary, ranging from retrieving confidential data to altering an application’s logic.
Check Point announces its Azure Virtual WAN security solution (Check Point)
Check Point is excited to announce its Azure Virtual WAN security solution, with CloudGuard providing industry-leading threat prevention, zero trust segmentation and North-South and East-West cloud network security.
Life After Death—SmokeLoader Continues to Haunt Using Old Vulnerabilities (Fortinet)
CVE-2017-0199 and CVE-2017-11882 are almost over five years old, but they are still being exploited. Worse, both vulnerabilities have had official patches for some time, yet they continue to be exploited.
If you’re like a lot of #SMBs—around 70%—you don’t have the experience to effectively manage a #ransomware attack. Learn how our Ransomware Readiness Assessment can help your business. #Citrix #cybersecurity #SMBsecurity
Your guide to Citrix graphics workload deployments with Citrix HDX 3D Pro (Citrix)
With the advent of more resource-intensive operating systems and common applications, graphics cards are not just for graphics-heavy users anymore. Options are available to either leverage a full or partial GPU depending on the requirements (keep reading for more on that).
Securing 5G and Edge Computing Environments with Zero Trust (Palo Alto Networks)
The proliferation of devices, the massive increase in intelligence at the network edge, and multi-tenancy and multi-cloud deployments are the significant difficulties that lead to a perfect storm of security risk in 5G enterprise deployments.
We would like to welcome Systems Engineer 1, Lex Phelan, to Gotham Technology Group. Working with our excellent Professional Services team, Lex will help us meet the growing industry demand for IT services.
Introducing AI-Powered Indicators of Attack: Predict and Stop Threats Faster Than Ever (CrowdStrike)
AI-generated indicators of attack (IOAs) fortify existing defenses by using cloud-based ML and real-time threat intelligence to analyze events at runtime and dynamically issue IOAs to the sensor.
CyberArk Acquires C3M, Accelerating Cloud Privilege Security and Cyber Risk Reduction (CyberArk)
As the number of identities continues to grow exponentially, we’re hitting the ground running to accelerate the delivery of Identity Security innovations that help organizations to analyze, monitor and secure access to public cloud resources and achieve measurable cyber risk reduction.
As #cyberattacks accelerate, #GothamTG is here to help you defeat #ransomware attacks, simplify infrastructure management, and provide all your users with an exceptional #VDI experience with @MicrosoftAzure. #Citrix #cybersecurity #infrastructure
Delivering Multicloud Agility with Software-defined Storage (Pure Storage)
Pure worked closely with Microsoft to define Azure Shared Disks, the new Azure storage feature that allows you to attach a managed disk to multiple VMs simultaneously.
The Power of Open: Why Okta Joined the OCSF Project (Okta)
Okta believes that technology delivers more value and security when it’s built to integrate and interoperate with other tools and software providers—which is why we’re a founding member of the Open Cybersecurity Schema Framework coalition (OCSF).