Cyber Security It’s time for Internet Providers to Become Primary Security Providers May 3, 2022 cyberdefensemagazine.com Consumers want cybersecurity protection and they consider their CSPs as potential partners By Barry Spielman, Director of Product […] The…
Cyber Security The Benefits of Hyperautomation May 1, 2022 cyberdefensemagazine.com By Nathan Hull, Principal Solutions Architect, Technologent Hyperautomation – in short, is the process of automating business automation. […] The…
Cyber Security 3 Best Practices to Avoid Inevitable Ransomware Attacks Apr 30, 2022 cyberdefensemagazine.com Tips to mitigate and protect against the ongoing threats of ransomware By Jesper Zerlang, CEO, LogPoint The total […] The…
Cyber Security Can Your Cybersecurity Culture Stand Up to the Latest Spear Phishing Techniques? Apr 29, 2022 cyberdefensemagazine.com By Josh Yavor, Chief Information Security Officer, Tessian Gone are the days of bulk spear phishing attacks, where […] The…
Cyber Security Doppler Takes on Secrets Management Apr 27, 2022 darkreading.com The startup is the latest company to try to solve the problem of organizing and sharing secrets.
Cyber Security Tenable’s Bit Discovery Buy Underscores Demand for Deeper Visibility of IT Assets Apr 27, 2022 darkreading.com The four-year-old firm, started by two industry veterans, focuses on gaining visibility into Internet-facing services as more companies seek insight…
Cyber Security Cyber Crime Is on The Rise and These Experts Have the Knowledge You Need Apr 26, 2022 cyberdefensemagazine.com By Jon Clemenson, Director of Information Security, TokenEx Nearly every day, there’s news about another major cyberattack on […] The…
Technology Hackers exploit critical VMware RCE flaw to install backdoors Apr 26, 2022 bleepingcomputer.com Advanced hackers are actively exploiting a critical remote code execution (RCE) vulnerability, CVE-2022-22954, that affects in VMware Workspace ONE Access (formerly…
Cyber Security Sophos Buys Alert-Monitoring Automation Vendor Apr 22, 2022 darkreading.com Acquisition of cloud-based alert security company will help Sophos automate tasks bogging down security teams, the company says.
Cyber Security Contrast Security Introduces Cloud-Native Automation Apr 22, 2022 darkreading.com New integrations enable Contrast capabilities to be delivered to Red Hat OpenShift users.
It’s time for Internet Providers to Become Primary Security Providers
Consumers want cybersecurity protection and they consider their CSPs as potential partners By Barry Spielman, Director of Product […] The…
The Benefits of Hyperautomation
By Nathan Hull, Principal Solutions Architect, Technologent Hyperautomation – in short, is the process of automating business automation. […] The…
3 Best Practices to Avoid Inevitable Ransomware Attacks
Tips to mitigate and protect against the ongoing threats of ransomware By Jesper Zerlang, CEO, LogPoint The total […] The…
Can Your Cybersecurity Culture Stand Up to the Latest Spear Phishing Techniques?
By Josh Yavor, Chief Information Security Officer, Tessian Gone are the days of bulk spear phishing attacks, where […] The…
Doppler Takes on Secrets Management
The startup is the latest company to try to solve the problem of organizing and sharing secrets.
Tenable’s Bit Discovery Buy Underscores Demand for Deeper Visibility of IT Assets
The four-year-old firm, started by two industry veterans, focuses on gaining visibility into Internet-facing services as more companies seek insight…
Cyber Crime Is on The Rise and These Experts Have the Knowledge You Need
By Jon Clemenson, Director of Information Security, TokenEx Nearly every day, there’s news about another major cyberattack on […] The…
Hackers exploit critical VMware RCE flaw to install backdoors
Advanced hackers are actively exploiting a critical remote code execution (RCE) vulnerability, CVE-2022-22954, that affects in VMware Workspace ONE Access (formerly…
Sophos Buys Alert-Monitoring Automation Vendor
Acquisition of cloud-based alert security company will help Sophos automate tasks bogging down security teams, the company says.
Contrast Security Introduces Cloud-Native Automation
New integrations enable Contrast capabilities to be delivered to Red Hat OpenShift users.