Expanded Cloud Visibility in FireEye Helix With Netskope
FireEye Helix will have visibility into thousands of alerts and events that Netskope generates every day. Customer data will be enriched with FireEye Threat Intelligence to help prioritize and evaluate all the threats happening across an enterprise.
Boldly Go Farther with Greater Efficiency for PAM (CyberArk)
Version 11.3 of the CyberArk Privileged Access Security Solution introduces several new features to improve PAM flexibility, efficiency and security to help our customers live long and prosper.
GuLoader: A Popular New VB6 Downloader that Abuses Cloud Services (Proofpoint)
GuLoader is a downloader, written partly in VB6, which typically stores its encrypted payloads on Google Drive or Microsoft OneDrive (underscoring that threat actors continue to adopt the cloud just like legitimate businesses are).
Enabling Your Remote Workforce (LoginVSI)
Our products have evolved significantly, now offering possibilities for capacity, load and continuous testing, and application compatibility testing. Recently we’ve been getting a lot of requests where companies need to rapidly scale their environment because their workforce can no longer come into the office.
What Do Users Get Out of Great Backup and Recovery Software? (Rubrik)
Regardless of a company’s size or industry, an effective backup and recovery solution is imperative for both protecting critical data and unlocking new value from that backup data.
Addressing the Four Most Critical Cybersecurity Challenges of our Generation (Fortinet)
To achieve this degree of deep security integration – something absolutely essential to achieving and maintaining a truly digital society and economy – cybersecurity leaders need to address four fundamental challenges.
Microsoft Confirms Takedown Of ‘Most Prolific’ Hacker Network: Millions Of Users Affected
Microsoft and partners have announced a major breakthrough in the fight against hackers, with the takedown of the prolific Necurs botnet. This automated network infected as many as nine million computers, used as endpoints to distribute dangerous emails and malware.
Improve on-prem site visibility with Citrix Analytics for Performance
Citrix Analytics for Performance is now generally available. A cloud service offering, Citrix Analytics for Performance enables admins to track, aggregate and visualize key performance indicators of Citrix Virtual Apps and Desktops sites.
February 2020’s Most Wanted Malware: Increase in Exploits Spreading the Mirai Botnet to IoT Devices (Check Point)
February saw a large increase in exploits targeting a vulnerability to spread the Mirai botnet, which is notorious for infecting IoT devices and conducting massive DDoS attacks.
Defending Against COVID-19 Cyber Scams
Exercise caution in handling any email with a COVID-19-related subject line, attachment, or hyperlink, and be wary of social media pleas, texts, or calls related to COVID-19.
The Future of Work Must be Agile for Employees and Businesses to Thrive (IGEL)
Global warming, fires, sandstorms, parental care, geopolitical shifts (like Brexit), talent retention, and so many other very ‘human’ and real issues are now commonplace, forcing organizations to rethink how they attract, manage, and maintain the most precious of resources – your employees. No longer is agile working simply a ‘nice to have,’ it’s a true need.
Remote Work Planning (Lakeside Software)
To help organizations accelerate the enablement of remote work during this challenging time, Lakeside Software is providing a free, cloud-hosted Remote Work Planning Solution powered by SysTrack. The solution is designed for simple, rapid deployment and analysis.