Citrix Expands Digital Workspace Security Offerings
The Citrix Ready Workspace Security Program provides a choice of leading security vendors that complement Citrix solutions, allowing people to securely work anytime, from anywhere, while simplifying how IT manages the environment.
McAfee debuts remote browser isolation solution, XDR platform
McAfee has launched a selection of new cybersecurity offerings including remote browser isolation tools to tackle attacks in real-time.
FireEye releases ThreatPursuit, a Windows VM for threat intel analysts
The idea behind ThreatPursuit is to provide companies with a ready-made OS that can be deployed to new workstations before, during, or after a security incident and provide threat intel analysts with a ready-to-use work environment.
Rethink the Cloud and Redefine Your Storage Strategy (Pure Storage)
With remote work quickly becoming a norm to support business continuity, consider the importance of remote manageability and accessibility of mission-critical workloads when redefining your storage strategy.
Proofpoint Named a Leader in 2020 Gartner Magic Quadrant for Enterprise Information Archiving for Ninth Consecutive Year
Proofpoint announced it has been positioned by Gartner, Inc. in the Leaders quadrant of the 2020 Magic Quadrant for Enterprise Information Archiving* for the ninth consecutive year.
Moving Beyond Traditional EDR (Palo Alto Networks)
XDR extends all the benefits you expect from a traditional EDR product by further stitching together telemetry from non-endpoint sources to provide better detection and a bigger picture of what’s going on in your environment for your security operations team.
Four Reasons to Strengthen Identity Security with SSO (CyberArk)
While it’s widely accepted that the “perimeter is dead,” current realities are forcing many organizations to evolve their security approaches faster than planned.
CyberWins: Arctic Wolf Saves the Day in the Middle of the Night for Large Manufacturer
Seven minutes after Arctic Wolf called the customer, the machine was off the network before the compromise was able to spread and inflict further damage.
Join Netskope from 12/7-12/10 for SASE Week, a weeklong series of virtual events catered to helping you understand Secure Access Service Edge architecture and enabling your digital transformation journey. See the link below for more details.
Check Point Software Launches Industry’s First Cyber Security Platform with Autonomous Threat Prevention
New R81 platform eliminates and automates labor-intensive security administration and management, also reducing policy installation time by up to 90%* across the entire distributed enterprise.
CyberArk Launches AI-Powered Service to Remove Excessive Cloud Permissions
As organizations rapidly scale cloud deployments, access permissions are often granted by default, based on group or role, and can go unused or have more entitlements than they actually need.
This new malware wants to add your Linux servers and IoT devices to its botnet
A new form of malware is targeting Linux servers and Internet of Things (IoT) devices and adding them to a botnet in what appears to be the first stage of a hacking campaign targeting cloud-computing infrastructure.
Proactive protection with Citrix Analytics for Security
Citrix Analytics for Security is a cloud-delivered security platform that helps protect corporate assets and minimize risk. It continually assesses user behavior in the digital workspace.
Palo Alto Networks Announces Intent to Acquire Expanse
Expanse's internet collection and attribution platform constantly monitors the global internet to map exposed and untracked assets that comprise customers' attack surfaces, evaluate and prioritize risk, and provide mitigation.
Mobile Phishing Increases More Than 300% as 2020 Chaos Continues (Proofpoint)
This recent surge in mobile phishing reports is concerning given that our recent Proofpoint 2020 State of the Phish Report found that 84% of organizations were subject to mobile-based phishing attacks, and the FBI has reported that losses from phishing and other scams topped more than $3.5 billion to individual and business victims in 2019.
Pure Storage Named Most Innovative Flash Memory Technology for Best of Show Award at Flash Memory Summit 2020
Designed for modern applications and workloads, FlashArray//C is uniquely capable of using raw QLC flash to provide enterprise-grade performance and endurance, without the expense of over-provisioning or adding a persistent memory tier.
Microsoft urges users to stop using phone-based multi-factor authentication
Alex Weinert, Director of Identity Security at Microsoft believes SMS and call-based MFA are “the least secure of the MFA methods available today” because of the ease with which determined attackers can intercept them
Malicious File Transfer: What You Need To Know About an Attacker’s Methods and Techniques To Protect Your Organization From Malware (FireEye)
41% of the year’s malware families were never seen before, and many breach and attack cases studied in the report began with phishing, one of the most prevalent ways that malware gets into a network.
Delivering Deeper Insight and Visibility for BIG-IP with Splunk (F5)
This fully Splunk-supported add-on makes it possible for Splunk administrators to pull network traffic data, system logs, system settings, performance metrics, and traffic stats from their BIG-IPs using syslogs, iRules, and the iControl REST API.