Introducing Pure Storage FlashRecover//S, Powered by Cohesity (Pure Storage)
Jointly architected by Pure Storage and Cohesity, FlashRecover//S is designed to deliver a powerful yet easy-to-use solution with multiple levels of built-in ransomware protection.
2023 Cybersecurity Trends We’re Tracking (CyberArk)
Cybersecurity doesn’t happen in a vacuum. Evolving attack trends, world events, regulatory changes, shifting organizational priorities and many other factors influence enterprise programs. With 2023 just around the corner, cybersecurity teams are considering them all carefully as they chart their course.
Looking back at the biggest Citrix DaaS and VDI accomplishments of 2022 (Citrix)
Whether you deploy on premises, from the cloud, or in a hybrid scenario, we have been adding new features and capabilities to both IT-managed Citrix Virtual Apps and Desktops and cloud-based Citrix DaaS that streamline and enhance both the admin and user experiences.
Malware Analysis: GuLoader Dissection Reveals New Anti-Analysis Techniques and Code Injection Redundancy (CrowdStrike)
GuLoader is an advanced malware downloader that uses a polymorphic shellcode loader to dodge traditional security solutions.
Is Cloud Native Security Good Enough? (Check Point)
Cloud native technologies enable organizations to tap into the agility required to keep up in the current competitive landscape and to create new business models. But achieving efficient, flexible, distributed and resilient cloud native security is tough.
The Grand Unified Theory of Cloud Governance (FireMon)
Organizations that ignore cloud and let it run wild and free always end up in trouble, and organizations that try to enforce their existing governance end up with… just a different set of troubles.
Palo Alto Networks (PANW) Completes Cider Security Acquisition (Palo Alto Networks)
Cider Security provides application security (AppSec) and software supply-chain security solutions, which offer continuous integration/continuous delivery platforms from a single place.
The Top 10, Top 10 Predictions for 2023 (F5)
As 2022 comes to a close, tech pundits blow the dust off their crystal balls and share their predictions for the coming year. For my own annual Top Ten lists I’ve been repurposing other, smarter folks’ insights since 2012—and since you all seem to find these roundups useful, let’s do it again!
What’s new with Citrix DaaS and Citrix Virtual Apps and Desktops — December 2022 (Citrix)
Citrix continues to roll out current releases of our on-premises and cloud products so organizations can get the latest features and functionality on a regular basis.
Revisiting Major 2022 Breaches and Cybersecurity Events (CyberArk)
History tends to repeat itself until we learn from it and make changes. While attack methods and threats continue to evolve, focusing on identity – the one true constant – is a solid cybersecurity strategy for 2023 and beyond.
Proofpoint Closes Acquisition of Illusive (Proofpoint)
Welcoming Illusive to Proofpoint enables us to further strengthen our market-leading threat and information protection platforms, providing our customers a unified solution that extends protection across the entire attack chain for critical threats like ransomware? and data breaches.
Check Point Enhances AWS Security with Cross-AZ Cluster Support (Check Point)
To alleviate the constraint and offer reliable and consistent AWS security, Check Point is proud to announce that CloudGuard Network Security now supports cross-AZ clusters.
Six Technical Capabilities to Accelerate Digital Transformation (F5)
With the power of digital, businesses will focus on user experience while reshaping the technology foundation to create more value.
The ransomware problem isn't going away, and these grim figures prove it
There's still huge disruption from ransomware attacks - and there's no sign that criminals intend to give up.