FireEye Named “Overall Infrastructure Security Solution Provider of the Year” in 2020 CyberSecurity Breakthrough Award Program
The Mandiant Solutions group brings together the world’s leading threat intelligence and front-line incident response data with its continuous security validation platform to arm organizations with the tools needed to increase security effectiveness and reduce organizational risk.
McAfee Delivers Affordable Education Bundle to Enhance Students’ Online Safety
According to the McAfee Labs Threat Report, the education community experienced a 1,114 percent increase in cloud threats between January and April due to COVID-19. Schools, who have limited resources and personnel to prevent threats, need cybersecurity protection now more than ever.
Expanding Security with CrowdStrike (Proofpoint)
As your people remain the top target for attackers, it is imperative to have a multi-layered defense to stop targeted attacks. Our existing integration that leverages Proofpoint TAP and CrowdStrike provides both pre-delivery and post-delivery protection through threat intelligence sharing.
Ransomware: How It Has Evolved to Be Faster, Stealthier, and Strike Harder (F5)
In 2019, we talked about how to defend yourself against ransomware. It’s 2020, and attackers have improved and strengthened their ransomware capabilities. We’re now seeing thousands of ransomware variants.
FBI sees spike in credential stuffing attacks (Barracuda)
Credential stuffing is fortunately a type of attack that typically tends to have low success rates. However, as botnets continue to grow the cost of launching large scale attacks in declining so cybersecurity teams should expect more waves of attacks using this threat vector.
Move your Citrix Workspace to the express lane with Citrix SD-WAN
When it comes to Citrix Workspace, no other vendor can provide a better-suited SD-WAN solution than Citrix.
Microsoft is Most Imitated Brand for Phishing Attempts in Q3 2020 (Check Point)
The most likely industry to be targeted by brand phishing was technology, followed by banking and then social network. This illustrates a broad spread of some of the best-known and most used consumer sectors.
5 Best Practices for Securing Privileged Access and Identities for the Cloud Management Console (CyberArk)
Now more than ever, it’s important for organizations to fully understand their role in securing cloud workloads as part of the shared responsibility model.
Rewriting the Rules for Unified Fast File and Object (Pure Storage)
By having fast access to all your data in one system, you can analyse it more easily and faster to gain insights that can ultimately lead to better business decisions.
5 Digital Experience Trends Accelerated by Remote Work (Lakeside Software)
As the conversation shifts from business continuity to knock-on effects including productivity, what is the long-term impact of the at-home digital experience?
Be your own cloud. Introducing SolidFire Enterprise SDS. (NetApp)
SolidFire eSDS delivers all the features you demand from tier 1 storage—enterprise-grade reliability, predictable performance, secure multitenancy, and more—with the flexibility of independent hardware procurement for business and operational optimization.
GravityRAT Comes Back to Earth with Android, macOS Spyware
The malware is capable of retrieving device data, contact lists, email addresses, call logs and SMS messages and can exfiltrate various types of documents and files.