Protect Passwords, Don’t Just Manage Them: A Game Plan for CIOs and CISOs (CyberArk)
Today’s attackers assign a level of value to employees’ passwords they once reserved for privileged users’ credentials. Why? Workers now have a shocking amount of access to sensitive resources.
Simplify Array Monitoring with New App for Splunk (Pure Storage)
The new unified app and technical add-on for Splunk simplify monitoring by providing performance metrics and more for Pure FlashArray and FlashBlade.
Introducing the new Microsoft Teams, now in preview
New Teams is built on a foundation of speed, performance, and flexibility, to help you save time, and work together more efficiently.
Fork in the Ice: The New Era of IcedID (Proofpoint)
Proofpoint is tracking new variants of IcedID used by at least three threat actors. Initial analysis suggests this is a forked version with potentially a separate panel for managing the malware.
Meeting Cybersecurity Insurance Requirements and Protecting Privileged Access (Fortinet)
With Fortinet’s recent release of FortiPAM, organizations can now more easily meet requirements for cybersecurity insurance. FortiPAM offers a range of features and capabilities that ensure secure access to critical assets and includes zero trust network access (ZTNA) controls.
How to Map Identity Security Maturity and Elevate Your Strategy (CyberArk)
As your organization thinks about building its Identity Security program, there are two fundamental factors to consider in tandem: Capability breadth and deployment depth.
Top Vulnerabilities in 2023 and How to Block Them (Check Point)
By the time malicious activities—ransomware, spoofed or forged emails, malware files or unknown computer processes—became visible, attackers had already gained access and laid the foundation for a successful campaign.
State of App Strategy 2023: Security at your Service. Literally. (F5)
We know from other industry research that when it comes to patching vulnerabilities there is a significant gap between discovery and closure that leaves businesses vulnerable to attack.
80 Cybersecurity Statistics and Trends [updated 2023] (Varonis)
As cybersecurity leaders seek to allocate resources to their most pressing 2023 priorities, it can be challenging to determine which areas of business deserve the most attention — and budget.
How Ransomware Works (Arctic Wolf)
Ransomware is everywhere. This nefarious attack vector is starting to dominate the cybercrime landscape, wreaking havoc and racking up massive damage across the globe.