The Importance of Identity and Access Management (Arctic Wolf)
Proper IAM management is a discipline that involves people, processes, and technologies, and is an ongoing journey that follows what is referred to as the access management lifecycle.
Cyber as a Shared Responsibility; How Rubrik and Zscaler Stepped Forward (Rubrik)
Over the past few years as ransomware and other threats have increased, private sector companies have embarked on aggressive journeys to reduce risk. Keeping pace with the threat environment requires technology vendors to build and innovate at a relentless pace.
Support Your Local Software
Introducing Cloud NGFW for Azure — On-Prem to Azure, Seamlessly Secure (Palo Alto Networks)
This fully managed next-generation firewall, available for customers through Microsoft Azure Native ISV Services, is built to better protect cloud-native and migrated applications with Palo Alto Networks AI and ML-powered next-generation firewall technology.
FlashBlade//E: The Endgame for Hard Drives (Pure Storage)
With significantly better TCO, reliability, ease of use, and sustainability, FlashBlade//E is the first all-flash product that goes toe-to-toe with all-disk systems.
May 2023 Patch Tuesday: Three Zero-Days and Six Critical Vulnerabilities Identified (CrowdStrike)
Microsoft has released patches for 38 vulnerabilities for its May 2023 Patch Tuesday rollout: 6 are rated as Critical while the remaining 32 are rated as Important.
RapperBot DDoS Botnet Expands into Cryptojacking (Fortinet)
Financially motivated botnet operators are always on the lookout to extract the maximum value from machines infected by their botnets.
Accelerate Your Hybrid Strategy with Citrix & Nutanix Cloud Clusters on Azure (Citrix)
The Citrix plugin for NC2 on Azure is available today for early access, and is currently compatible with Citrix Machine Creation Services (MCS). Compatibility with Citrix Provisioning Services (PVS) is expected prior to general availability later this year.
April 2023’s Most Wanted Malware: Qbot Launches Substantial Malspam Campaign and Mirai Makes its Return (Check Point)
Cybercriminals are constantly working on new methods to bypass restrictions and these campaigns are further proof of how malware adapts to survive.
Secure Identities With These Five Intelligent Privilege Controls (CyberArk)
Today’s threats require an identity security platform that’s integrated in every way — built to protect every identity (human and machine) and every resource they touch, across every one of your environments.
Microsoft (M365) vs. Office (O365): Licensing Explained (Nerdio)
The Microsoft 365 (M365) and Office 365 (O365) licensing options can be confusing, especially when it comes to understanding the differences between the two. Both M365 and O365 offer a suite of productivity tools, but the licensing models, features, and pricing structures vary between the two.