Purity//FA 6.6.0: Paving the Way for FlashArray//E (Pure Storage)
Purity//FA 6.6.0 delivers bold ESG benefits, enables storage consolidation, and simplifies storage provisioning along with other improvements for FlashArray customers.
How to Secure Your Network Infrastructure (Arctic Wolf)
Effective security operations are necessary to continuously monitor data centers and servers, user login activity, SaaS applications, cloud workloads, email systems, and managed laptops and other endpoints.
I Don’t Care ft. Bryon Singh, RailWorks Corporation
Building Secure and Compliant SaaS Apps – Identity Security Best Practices (CyberArk)
No matter the size and scale of your cloud-hosted app, addressing identity security-related compliance requirements is a necessary step to grow your business.
Cybersecurity Stop of the Month: Attack Sequence of TOAD Threats (Proofpoint)
In this post, we look at a telephone-oriented attack delivery (TOAD) threat that Proofpoint detected during a recent threat assessment. We also cover the typical attack sequence of TOAD threats. And we take a deeper look into how the artificial intelligence (AI) and machine learning (ML) engines that Proofpoint uses can detect these threats.
Palo Alto Networks® Announces Intent to Acquire Enterprise Browser Start-up Talon Cyber Security (Palo Alto Networks)
Talon's Enterprise Browser provides an innovative, cutting-edge solution that, when combined with Prisma® SASE, will enable users to securely access business applications from any device, including mobile and other non-corporate devices, while delivering seamless user experiences.
Get more from your Citrix deployment: Hybrid, multi-cloud with Nutanix (Citrix)
Citrix and Nutanix is a powerful combination for delivering virtual applications and desktops in a hybrid, multi-cloud environment. Citrix DaaS provides the leading virtualization and application delivery platform, while the Nutanix Cloud Platform offers a hyperconverged infrastructure solution that is simple to manage and scale.
Compromising Identity Provider Federation (CrowdStrike)
CrowdStrike’s Incident Response team has seen a recent increase in cases involving adversaries that abuse identity provider federation to gain access to protected services by adding and authorizing rogue domains to federation.
Why Microsoft Intune is Important for Modern IT Management (Nerdio)
Intune features have significantly expanded over its lifetime which has led to it becoming an important tool for user and device management. Many organizations face challenges in understanding how Intune fits into their existing infrastructure.
We are pleased to announce that Louis Aurrichio has joined Gotham Technology Group as Global Client Account Director. Lou is a powerhouse, and a long-time friend of Gotham Technology Group. In his previous roles at Check Point, Nokia, Genicom, and Olympus America, his steady accomplishments underscore his commitment to excellence, capacity to drive results, and proven sales achievements across a large executive customer base. His expertise, values, and commitment to the customer align perfectly with our goals and vision, and we are confident that he will be a significant contributor as Gotham scales and continues to lead in the northeast region. Please join us in extending a warm welcome to Lou as he embarks on his journey with Gotham!
For our full release, visit: https://www.gothamtg.com/gotham-news
Unraveling the Complexities of Word Documents (Votiro)
The widespread utilization of Word documents also brings significant concerns, primarily due to their inherent complexity, which introduces heightened security risks.
Data Detection & Response (DDR): From Noise to Signal to Solution (Rubrik)
The environments cybersecurity professionals need to secure have grown a lot more complex over the years, as we have adopted new architectural principles and hybrid and multi-cloud infrastructures in the race for a competitive edge.