Combatting BEC and EAC: Authenticating Email with DMARC (Proofpoint)
Because this protection takes place at the domain level, messages will be blocked regardless of their payload, whether it’s a message containing a malicious time-delayed URL, an attachment, or a BEC attack that has no malicious content at all.
Pure Storage to Acquire Portworx, Creating the Industry's Most Complete Kubernetes Data Services Platform for Cloud Native Applications
By combining Portworx container data services with Pure’s industry-leading data platforms and Pure Service Orchestrator software, Pure will provide a comprehensive suite of data services that can be deployed in-cloud, on bare metal, or on enterprise arrays, all natively orchestrated in Kubernetes.
Put Privileged Access Management at the Core of NIST Zero Trust Architecture (CyberArk)
Today, it’s impossible to contain — let alone trust — all of the people, machines and applications that must dynamically access company systems and data, so Zero Trust models are becoming more popular. Zero Trust, as the name suggests, means anyone and everything trying to connect to an enterprise system is verified before access is granted.
Slow is the new Down (F5)
Some customers have even told us that slow performance can often be worse than being completely down. Having something tantalizingly seem to almost work, then re-trying over and over is more aggravating than just having a lack of function.
Is Cloud Storage IOPS the real cause for poor application performance? (Turbonomic)
IOPS awareness also helps Turbonomic users to ensure that when a VM’s resources are being underutilized, it still guarantees the performance as a result of the scale action.
Windows 7 Extended Support – a Ticking Time Bomb (IGEL)
Today, millions of Windows 7 devices are now located in people’s homes and have not been migrated. IT departments have been consumed with work from home (WFH) strategies during the pandemic, and instead of migrating machines, one office at a time, are left trying to work out how to migrate one machine, one home at a time.
CISA warns of notable increase in LokiBot malware
The CISA LokiBot advisory published today contains detection and mitigation advice on dealing with LokiBot attacks and infections.
Citrix solutions now available in the Azure Marketplace
We are pleased to announce two of our exciting Citrix-on-Azure cloud services are now available inside the Azure Marketplace to help our customers rapidly scale environments into the cloud, and accelerate the transition to the future of work.
Uniting Security Superpowers: Mandiant Solutions and Microsoft Working Together for Better Security Outcomes (FireEye)
As a MISA member, Mandiant joins a far-reaching collaboration between leading security technology companies to deliver world-class protection to joint customers.
The Trend Toward Serverless: What, Why, and How? (Check Point)
Early versions of what are now called serverless products referred to themselves as function-as-a-service (FaaS) offerings. These FaaS offerings had evolved from similar backend-as-a-service offerings designed to minimize the infrastructure needed to bring an application to market.
Fileless Malware Tops Critical Endpoint Threats for 1H 2020
When it comes to endpoint security, a handful of threats make up the bulk of the most serious attack tools and tactics. In the first half of 2020, the most common critical-severity cybersecurity threat to endpoints was fileless malware, according to a recent analysis of telemetry data from Cisco.