Diving deep into Citrix zero trust architecture (Citrix)
As enterprises migrate toward a mature zero trust architecture, it is important to understand the core concepts of how to design the architecture and how to configure the environment to satisfy the tenets of a zero trust architecture.
AI, ChatGPT and Identity Security’s Critical Human Element (CyberArk)
As public debate and regulatory scrutiny around artificial intelligence (AI) and machine learning (ML) intensify, enterprise cybersecurity teams should stay vigilant without losing sight of the bigger picture. That is, that cyberattacks are inevitable – no matter how, where or why they originate. But damage is not.
March 2023’s Most Wanted Malware: New Emotet Campaign Bypasses Microsoft Blocks to Distribute Malicious OneNote Files (Check Point)
Check Point Research reports that Emotet Trojan launched a new campaign last month to evade Microsoft’s macro block, sending spam emails containing malicious OneNote files. Meanwhile Ahmyth was the most prevalent mobile malware and Log4j took top spot once again as the most exploited vulnerability.
What is phishing? Everything you need to know to protect yourself from scammers
It might have been around for almost 20 years, but phishing remains a threat for two reasons: it's simple to carry out -- even by one-person operations -- and it works, because there's still plenty of people on the internet who aren't aware of the threats they face.
Increase IT Agility and Reduce Spend with STaaS (Pure Storage)
Storage as a service (STaaS) can help IT leaders not only reduce IT spend but also meet demands for critical services and strategic support from the organization.
Achieve Near-Zero RPO & RTO with Orchestrated Application Recovery (Rubrik)
Orchestrated Application Recovery is incredibly easy to use: no need to install new binaries, no need to integrate between different vendor’s products.
Implementation Groups – There Can Be Only One
Telemetry and Digital Business (F5)
The convergence of data and digital business should be no surprise. A glance at our phones will demonstrate the nearly insatiable need of every organization, regardless of industry.
Are Internet Macros Dead or Alive? (Fortinet)
Even though several cyber threat actors have adopted TTPs to not use Office macros, we have observed several threat actors still relying on Office macros to initiate their attacks.
Chaos in the Cloud: Rampant Cloud Activity Requires Modern Protection (CrowdStrike)
Digital transformation isn’t only for the good guys. Adversaries are undergoing their own digital transformation to exploit modern IT infrastructures — a trend we’re seeing play out in real time as they increasingly adapt their knowledge and tradecraft to exploit cloud environments.
5G Security — A Shared Responsibility (Palo Alto Networks)
As 5G continues to gain market momentum and more and more enterprises embrace it for their wireless transport, an important question arises which must not be ignored. Who is responsible for making 5G secure?