FireEye Announces Acquisition of Respond Software
The acquisition of Respond Software enables Mandiant Solutions to further productize and scale its expertise and front-line intelligence as part of the Mandiant Advantage platform.
Three Things to Know About Insider Threats in the Gig Economy (Proofpoint)
Many companies don’t apply the same security principles to third parties as they do to internal employees. This increases exposure to organizations – particularly if proper controls are not put into place to protect from insider-led security breaches.
70,000 Phishing Emails Sent Impersonating the IRS: How to Stay Protected (McAfee)
Be skeptical of emails or text messages claiming to be from organizations with peculiar asks or information that seems too good to be true. Instead of clicking on a link within the email or text, it’s best to go straight to the organization’s website or contact customer service.
Secure Your Cloud Native Applications and DevOps Pipeline in Six Steps (CyberArk)
With DevOps, new application functionality can be delivered in rapid iterations and at scale, driving agile innovation to meet increasing customer demands and build competitive advantage.
Taming Complexity and Enabling Modern App Delivery at Scale (F5)
The promise of modern apps is the ability to develop, deploy, and deliver applications rapidly and reliably, ensuring your customers have access to the applications they need—whenever they need them.
Data Economics: From Cost to Innovation (Pure Storage)
Digitization is an increasingly integral part of business, regardless of the sector, as every touchpoint produces more and more data. From customer information and cybersecurity to regulatory compliance and analytics, AI, and more, digitization means more data.
Transform your employee experience with the latest Workspace interface (Citrix)
All in all, Citrix Workspace lets you give users far more than you could with Citrix StoreFront — from delivering apps and desktops, to delivering a complete work experience.
When Every Day is Cyber Monday, Attackers Can Score Big (CyberArk)
The spike in online shopping and digital advertising is also creating more opportunity for attackers – who are looking to take advantage of unsuspecting consumers – many of whom admit to risky shopping habits.
The Fourth Wave of Cloud is Imminent (F5)
The driver behind these migrations is two-fold: reducing IT operating costs and freeing up resources to focus on producing value.
Now is the time to strike a bargain with remote workers (Barracuda)
Savvy IT leaders should be asking end users for their input as part of a grand bargain. The mere fact that a review of remote computing policies and technologies is being conducted is usually enough to at least make people feel like they are being heard.
The biggest hacks, data breaches of 2020
Cyberattackers certainly haven't given anyone a break this year. Data breaches, network infiltrations, bulk data theft and sale, identity theft, and ransomware outbreaks have all occurred over 2020 and the underground market shows no signs of stopping.
Where’s the package I’m expecting? Watch out for shipping and delivery-related phishing emails that try to track YOUR details (Check Point)
It isn’t just retailers who are looking forward to a record weekend: threat actors are organizing their infrastructures to try and grab their share of our holiday spending, too.
FBI warns of email forwarding rules being abused in recent hacks
Threat actors absolutely love email auto-forwarding rules as they allow them to receive copies of all incoming emails without having to log into an account each day -- and be at risk of triggering a security warning for a suspicious login.
7 Cybersecurity Best Practices Financial Firms Should Live By (Arctic Wolf)
According to Verizon's 2019 Data Breach Investigations Report, financial gain was the most common motive in data breaches across all industries, with 71 percent of breaches financially motivated. And in the financial and insurance sector, the number was even higher: 88 percent.
Better Together: FireEye and AWS Offer Holistic Cloud Security Approach for Government
Public-sector institutions are rightly concerned about securing data as it’s stored, transferred and accessed via cloud environments. Government agencies are a top target for cyber criminals.
Five Holiday Scams to Avoid and Safety Tips (Infographic) (Proofpoint)
Because cybercriminals always follow the money, we’ve outlined five scams you might encounter along with tips on how to stay safe this holiday season.
Pure Storage Named a Leader in Gartner Magic Quadrant for Primary Storage Arrays
Pure Storage announced it has been positioned by Gartner as a Leader in the 2020 Magic Quadrant for Primary Storage Arrays. This is the seventh year in a row that Pure Storage has been named in the Leaders quadrant of various Gartner Magic Quadrants.