Citrix Cloud Connectors: How they work and how to get the most from them (Citrix)
Cloud Connectors unlock the advantages of cloud management by bridging on-prem and cloud deployments, without requiring complex networking or infrastructure configuration.
Cyber Threats Happen — Prevention, Protection and Recovery Tips (Palo Alto Networks)
While there’s no way to predict a bad actor’s next move, we do know that people are the first line of defense, and they can significantly help prevent an attempted attack from becoming a successful one.
Are you re-using passwords across web platforms? Think again! Stolen credentials databases are a flourishing underground market (Check Point)
Although most of the population understands the risk and knows that one shouldn’t reuse passwords, most of us continue reusing passwords for both corporate and personal accounts.
CISA Releases Guidance on Phishing-Resistant and Numbers Matching Multifactor Authentication
CISA has released two fact sheets to highlight threats against accounts and systems using certain forms of multifactor authentication (MFA). CISA strongly urges all organizations to implement phishing-resistant MFA to protect against phishing and other known cyber threats.
Smishing: What It Is, Why It Matters, and How to Protect Yourself (Arctic Wolf)
Smishing has been working so well for the bad guys because text messages increase their chances of getting their message to their target.
5 Identity Security Considerations for Updating Software (CyberArk)
Last year, threat researchers logged 18,439 common vulnerabilities and exposures (CVEs) in the NIST National Vulnerability Database (NVD) – or more than 50 new flaws per day. With so many vulnerabilities piling up, security teams don’t have the time or resources to make every software update, every time a new vulnerability is disclosed.
Transformation Depends on People. Empower Them with Flexible Services (Pure Storage)
Your people are at the heart of your organization, and they need flexibility and flexible services to empower them and make your digital transformation a success.
FBI and CISA: Here's what you need to know about DDoS attacks
DDoS attacks can be cheap to create but disruptive, so it could be worthwhile for network defenders to take a look at CISA's and the FBI's guidance as a backup to what they likely already know about the attacks, which can overload networks, protocols, and applications.
Infrastructure Security is Not Enough to Defend Against Ransomware (Rubrik)
When attackers penetrate the infrastructure defense, they can access critical business data and destroy, encrypt, or exfiltrate it. Once they get in, how do you stop them from taking your business down by holding your data hostage?
Ransomware Roundup: New FBI, Wise Guys, and “Pyschedelic” Ransomware (Fortinet)
Due to the ease of disruption, damage to daily operations, potential impact to an organization's reputation, and the unwanted destruction or release of personally identifiable information (PII), etc., it is vital to keep all AV and IPS signatures up to date.