Key Takeaways from the State of Zero Trust Report (Fortinet)
In April, Fortinet commissioned a survey of 570 IT and security leaders from 31 different countries, covering nearly all industries, including the public sector. The resulting 2023 State of Zero Trust Report provides insight into the progress IT teams are making in implementing their zero-trust strategies.
Think Your Secrets are Safe in their Vault? Think Again (Check Point)
As organizations grow and developers’ workloads get busier, the number of credentials required grows. Where other vulnerabilities show a specific weakness in code and can be fixed, leaked secrets have a way of getting disseminated through the system.
We’re proud to announce our placement on the 2023 ChannelFutures MSP 501. The #MSP501 ranks top MSPs from around the world, proving we are among the best at what we do. As a 2023 winner, we’re excited to be in an industry community of leadership & excellence.
The Secret Handshake ft. Bryon Singh from RailWorks Corporation
What’s New in Citrix Cloud – June 2023
Citrix continues to innovate their Citrix Cloud platform with new enhancements and capabilities. Here are some highlights of some of the recent new enhancements and capabilities that are now available to the public.
Unleashing the Power of Tabletop Exercises
In the wild world of cyber threats, where hackers lurk around every corner, it's time to put on your capes and embrace the power of tabletop exercises. These exercises might not involve actual tables or Olympic-level athleticism, but they do play a crucial role in fortifying your cyber defenses.
Strengthening Cybersecurity: The Vital Role of Tabletop Exercises
In today's interconnected digital landscape, where cyber threats loom large, ensuring robust cybersecurity measures is crucial for individuals, businesses, and organizations alike. The complexity and evolving nature of cyber threats necessitates proactive approaches to identify vulnerabilities, assess response capabilities, and enhance incident management.
PVS Catalogs Made Easy with Citrix DaaS MCS Provisioning (Citrix)
Citrix DaaS has recently launched a new Technical Preview feature, Creating Citrix Provisioning catalogs in DaaS, in Web Studio. With this new feature, customers can create Citrix Provisioning (PVS) machine catalogs on Azure directly in DaaS Studio with just a few clicks.
How CrowdStrike Uses Similarity-Based Mapping to Understand Cybersecurity Data and Prevent Breaches (CrowdStrike)
CrowdStrike data scientists describe a new similarity paradigm to organize information and make it accessible, searchable and mappable.
Fort Knox Got Nothing On Me ft. Bryon Singh, RailWorks Corporation
What’s new in Varonis: June 2023 (Varonis)
Varonis is easier than ever to use as a starting point for investigating suspicious behavior like ransomware, data exfiltration, and unauthorized data access across your cloud environment.
Top Six Identity Security Risks Compounding Cyber Debt and Expanding the Attack Surface (CyberArk)
Our latest research also explores the 2023 attack landscape, including industry-specific trends and growing AI angst, and demonstrates the longtail effect of today’s cybersecurity decisions on future success.
Agentless Workload Scanning Gets Supercharged with Malware Scanning (Palo Alto Networks)
Teams need the ability to set up cloud security in a few clicks. Organizations need actionable insights on day one from the solutions they rely on.
Amazon Prime Day: This Year Already Started for Cybercriminals. Check Point Research calls online shoppers to be wary (Check Point)
Amazon prime related phishing campaigns grew 16- folds higher in June, compared to May. The overall increase in all Amazon related phishing was 8%.
Wide Open Outbound Firewall Policy - Part 3
We are very excited to welcome Bob Laurenzo as our new Vice President of Sales. Bob brings extensive experience in strategic business development and technology sales, making him a great addition to our team. Welcome Bob!
Cybersecurity Stop of the Month: Defending Against the EvilProxy Phishing Toolkit and Cloud Account Takeover (Proofpoint)
Today’s sophisticated cyber threats can only be stopped by companies when they stay vigilant and adopt proactive defenses to protect themselves and their customers.
RIP Passwords: Why the Future Is Passwordless (HYPR)
Keeping track of multiple passwords or generating endless passphrases becomes quite unwieldy after a while. Fortunately, we are on the path to a bright future of passwordless technology.