A New Era of Email Security: Easier—and Even More Effective (Proofpoint)
Email is the number one threat vector and a massive risk vector for breaches today, which is why it's crucial for organizations to have an effective, integrated set of controls to stop phishing attacks and other email-related threats.
Why Strong Passwords Alone Won’t Stop Identity-Based Attacks (CyberArk)
No matter how strong your organization’s password policies and awareness efforts are, they won’t be enough to defend your organization against identity-based attacks on their own.
6 Rules to Protect Yourself From Phishing (Arctic Wolf)
When everyone works together to create a culture of security, the organization builds a strong safety net capable of protecting all users, even when they are tired, distracted, or stressed.
CrowdStrike Enables Federal Departments and Agencies to Meet CISA Operational Directive 23-01 (CrowdStrike)
The Cybersecurity and Infrastructure Security Agency (CISA) recently published a Binding Operational Directive (BOD) 23-01, designed to improve cybersecurity for the Federal Civilian Executive Branch (FCEB) enterprise and their respective unclassified assets.
Announcing the Citrix HDX Plus for Windows 365 public preview (Citrix)
Citrix HDX Plus for Windows 365 enables your organization to extend hybrid work scenarios on Cloud PCs to your most challenging use cases.
Delivery of Malware: A Look at Phishing Campaigns in Q3 2022 (Fortinet)
To help organizations better identify and prevent phishing attacks and infections, this blog provides some of the most common details and techniques used by these malicious files for malware deployment.
The FBI Publishes Statement – Unpatched and Outdated IoT Devices Increase Cyber Attack Opportunities (Check Point)
The FBI recently issued an industry notification around unpatched and outdated devices, warning the public that cyber criminals are increasingly targeting internet-connected devices for the purpose of exploiting their vulnerabilities.
What is IDOR (Insecure Direct Object Reference)? (Varonis)
IDOR bugs allow an attacker to maliciously interact with a web application by manipulating a “direct object reference,” such as a database key, query parameter, or filename.
Okta Workflows How-To: How to Add Error Handling to a Flow (Okta)
Okta Workflows is a no-code platform for automating identity processes. This blog post is based on a question asked during office hours: How to add error handling to a flow and continue execution when an error occurs?
Why Data Means Business for the Public Sector (Pure Storage)
There are three key areas where data can be used in the public sector to help reduce costs, generate revenue, and create a positive impact for citizens.