Proofpoint and CyberArk Extend Partnership to Further Safeguard High-Risk Users with People-Centric Protection
The Proofpoint and CyberArk partnership features a combination of layered defenses designed to stop threats before they reach users and apply policies and controls that ensure privilege accuracy.
Attackers Steal Outlook Credentials Via Overlay Screens on Legitimate Sites
The emails imitated the technical-support team of the employee’s company (with “Support” in the sender title and “Action Required” in the subject line) and claimed that the company’s email-security service had quarantined three valid email messages, blocking them from entering the inbox.
Application Modernization: When Rewrite is Better than Refactor (F5)
One of the biggest impacts of digital transformation is the disruption to application development. Historically, the introduction of new architectures into app development generally takes several years before it kicks into high gear and sees mainstream adoption. http://f5so.co/290CFF
Customer Outcomes and End-User Experience Matter More Than Raw Numbers for Cloud Services (Forcepoint)
How do you help your customers protect users working from anywhere accessing data that’s located everywhere, all while addressing compliance and regulatory requirements and delivering best-in-class user experience?
Citrix Cloud licensing page updates enhance your visibility
We are constantly evolving the Licensing page in Citrix Cloud to provide more insight into how you consume Citrix products, regardless of your deployment type or location. All the new features highlighted are in production today.
Ransomware: Huge rise in attacks this year as cyber criminals hunt bigger pay days
Not only has the number of ransomware attacks increased, but ransomware has continued evolving, with some of the most popular forms of ransomware last year having disappeared while new forms of ransomware have emerged. In some cases, these are even more disruptive and damaging.
Top Cloud Security Challenges in 2020 (Check Point)
This accelerated move to the cloud and the security gaps this has created has led to an increase in attacks and growing concern among companies, which despite their best efforts have failed to thwart these.
NSA and CISA Urge Action to Reduce Operational Technology Risk (CyberArk)
The U.S. National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) recently issued an alert recommending actions to reduce exposure across operational technologies and industrial control systems (ICS). It includes guidance on securing privileged credentials, which threat actors consistently target as part of critical infrastructure attacks.
Zeppelin Ransomware Returns with New Trojan on Board
Zeppelin is a variant of the Delphi-based ransomware-as-a-service (RaaS) family initially known as Vega or VegaLocker, which emerged at the beginning of 2019. Unlike its predecessor, Zeppelin is much more targeted, and first took aim at targeted tech and healthcare companies in Europe and the U.S.