Citrix’s Chief Security Architect on how to avoid misconfiguration
Misconfiguration risk can be efficiently managed by planning security before deployment, not as an afterthought. Planning ahead can greatly reduce misconfiguration risk at low cost and with moderate effort — a vital activity for such an important threat.
McAfee To Debut New Partner Program Synced With Technology Vision
The new training program will be tightly aligned with McAfee's corporate strategy around emerging technologies such as MVision Cloud, MVision EDR (Endpoint Detection and Response) and MVision Insight.
CyberArk Privilege Cloud Now Available on AWS Marketplace
Designed from the ground up for security, CyberArk Privilege Cloud helps organizations efficiently manage privileged account credentials and access rights, proactively monitor and control privileged account activity and quickly respond to threats.
Knowing About Vulnerabilities is only Half the Battle
But knowing vulnerabilities exist in source code is only half the battle… The reality of application security is that the other half is "Doing something about those vulnerabilities."
Carbon Black Stock Officially Ends As VMware Nears Acquisition
VMware plans to disrupt the security market as a whole through organic security innovation, leveraging its massive vSphere customer base and by purchasing Carbon Black.
FBI warns about attacks that bypass multi-factor authentication (MFA)
The FBI made it very clear that its alert should be taken only as a precaution, and not an attack on the efficiency of MFA, which the agency still recommends. Instead, the FBI wants users of MFA solutions to be aware that cyber-criminals now have ways around such account protections.
10 Hot New FireEye Tools Unveiled At FireEye Cyber Defesne Summit
From automating attack simulations to monitoring malicious content in real time to finally running on AWS, here’s a look at 10 of the most interesting FireEye tools from FireEye Cyber Defense Summit 2019.
What Is Social Engineering Training?
While the need for anti-phishing training is increasingly obvious, don’t overlook the value of broader social engineering training. Since phishing tactics are constantly evolving, teaching end users about the underlying social engineering principles can help them respond to the changing threat landscape.
Hewlett Packard Enterprise and Nutanix Announce General Availability of GreenLake and ProLiant DX Solutions
The HPE GreenLake solution leverages Nutanix’s Enterprise Cloud OS software, including its built-in AHV hypervisor, to deliver a fully HPE-managed private cloud that dramatically lowers total cost of ownership and accelerates time to value, while allowing customers to pay for the service based on actual consumption.