Microsoft and F5: Together Addressing Secure Remote Access and Productivity (F5 Networks)
F5 BIG-IP APM and Azure Active Directory simplify the user experience for application access by enabling users to log in once and access all applications they have the right to access, from a single location.
We Are Excited to Announce the Acquisition of The Defence Works (Proofpoint)
The Defence Works’ award-winning content will be integrated into our broader Proofpoint Security Awareness Training offering. This library consists of highly interactive content, including their “classic interactive” modules, monthly episodes based on real life events and live action sketches.
Azure data backup: a technical look at Veeam Backup for Microsoft Azure (Veeam)
Veeam Backup for Microsoft Azure delivers native Azure backup for Microsoft Azure virtual machines (VMs), enabling users to cost-effectively and securely protect their cloud data to overcome any data loss scenario quickly and efficiently.
Astaroth malware hides command servers in YouTube channel descriptions
And if the malware wasn't hard enough to analyze, stopping its communications is also a tricky task. Following its most recent update, Astaroth now uses YouTube channel descriptions to hide the URL for its command and control (C2) servers.
HPE and Citrix: Let us help you in these times
Together, Citrix and HPE can get your workforce working remotely at rapid speed while we also align to your forward-looking digital transformation strategic imperatives.
CyberArk snaps up identity startup Idaptive for $70M
CyberArk said the acquisition will bolster its position in the identity management space, allowing its customers to improve their security posture across a multitude of different infrastructures, like hybrid and multi-cloud environments.
Determining the best remote access strategy for your organization (Citrix)
As businesses have rushed to enable remote work quickly in response to COVID-19, many have responded tactically rather than strategically, expecting work from home to be a temporary situation and overlooking the security concerns around VPN.
Selecting Secure SD-WAN Solutions Based on Use Case Requirements (Fortinet)
Specific SD-WAN use cases not only continue to multiply, but evolve as well, which requires organizations to carefully consider which SD-WAN features and functions are most important for their organization, now and into the future.
This powerful Android malware stayed hidden for years, infecting tens of thousands of smartphones
Mandrake spyware hoovers up information ranging from account credentials, screen records, GPS and more -- and has been for years. All while those behind it carefully cover their tracks.