Why Good Cyber Security Starts with Great Data Management (NetApp)
Above all else, good security management is predicated on good data management. Along every step of the security journey – from prevent to detect to respond – knowing where your data is, how to extract it, and how it interoperates across and beyond organizational boundaries are key to ensuring you protect yours and your customers’ most valuable intelligence.
This botnet has surged back into action spreading a new ransomware campaign via phishing emails
Phorpeix attempts to lure victims into opening a Zip file attachment in a phishing email that uses a wink emoji as the subject. It might sound like a basic form of cyberattack, but criminals wouldn't be using it if it didn't work.
Citrix, Microsoft expand partnership to enhance simplicity, security, agility
Our latest joint offerings establish Citrix Workspace as a preferred digital workspace platform for Microsoft customers, and Microsoft Azure as a preferred public cloud for companies using Citrix solutions to enable people to work anywhere across devices.
2 Ways CPU Queueing is Killing Your Application Performance (Turbonomic)
Even a conservatively oversubscribed hypervisor host will see periods of high wait time which may not seem to be a problem by the naked eye. Your applications (and your customers and employees) will definitely pay the price of CPU queueing issues.
July 2020 Security Update:?CVE-2020-1350 Vulnerability in Windows Domain Name System (DNS) Server
Today Microsoft released an update for CVE-2020-1350, a Critical Remote Code Execution (RCE) vulnerability in Windows DNS Server that affects all Windows Server versions. The vulnerability is classified as wormable, in that it has the potential to spread via malware without user interaction, and has a CVSS base score of 10.0.
What is ransomware? Everything you need to know about one of the biggest menaces on the web
As ransomware continues to evolve, it's therefore crucial for your employees to understand the threat it poses, and for organisations to do everything possible to avoid infection, because ransomware can be crippling and decryption is not always an option.
The Egregious 11: Examining the Top Cloud Computing Threats (CyberArk)
The CSA recorded a drop in rankings of traditional cloud security issues under the responsibility of cloud service providers – such as denial of service, shared technology vulnerabilities and CSP data loss – suggesting these issues are less of a concern for organizations than in years past. The biggest threats now come from issues like misconfigurations and insufficient identity access management where the customer is solely responsible for security.
The Changing World of Encryption: TLS Deployments in 2020 (F5)
The TLS landscape isn’t what it used to be, and organizations need to stay on top of the latest developments to ensure that websites are securely deployed and maintained over their lifetime.
Getting Data Protection Right (Pure Storage)
While legacy storage solutions were synonymous with excessive maintenance renewals, operational complexity, disruptive upgrades with forced data migrations, and other flaws, Pure has focused on doing things differently—and getting it right.
The new digital worker: Designing an exceptional employee experience (Citrix)
As we look ahead to the future of work, businesses will need to expand what they mean by employee experience. “This is the time for iteration and innovation and the future of work is the combination of human-centred experience design for employees,” digital anthropologist Brian Solis says.
Fake Downloaders Aimed at Organizations in Canada, France, Germany, Spain, Italy, the United Kingdom, and the United States (Proofpoint)
In June and July 2020, thousands of messages were sent to organizations in Canada, France, Germany, Spain, Italy, the United Kingdom, and the United States. In one campaign from early July alone, Proofpoint observed nearly 18,000 messages from this actor. These campaigns featured links to websites compromised with SocGholish HTML injects.