Endpoint

DoH and Phishing Risks. What You Need to Know Now

As we continue to transition our lives to the digital world, our digital footprint continues to grow. As our data…

2 months ago

Qualys Applies the Concept of EDR Across Your Whole Environment

Qualys recently made its Multi-Vector EDR offering generally available. The product takes the idea of endpoint detection and response (EDR)…

2 months ago

Build a resilient cybersecurity framework by transforming your IT team into a security team

More organizations than ever before have shifted to a hybrid work culture to reduce the impact of COVID-19. This unprecedented…

2 months ago

UEM: Es tiempo de asegurar los navegadores de su empresa.

Al hablar de gestión unificada de endpoints (UEM – Unfied Endpoint Management), es usual que los administradores de TI piensen…

3 months ago

DH2i Extends Software-Defined Perimeter to IoT Devices

DH2i has launched DxOdyssey for IoT, an instance of its software-defined perimeter (SDP) and smart availability software encapsulated in a…

3 months ago

Remote Workforce: Ensuring Operations Move Forward in the New Normal

The post Remote Workforce: Ensuring Operations Move Forward in the New Normal appeared first on Fidelis Cybersecurity.

3 months ago

Ivanti Acquires MobileIron and Pulse Secure

Ivanti this week announced it has entered into a pair of agreements to acquire MobileIron and Pulse Secure as part…

3 months ago

Advanced Active Directory attacks: Simulating domain controller behavior

There was a time when cyberattacks on identity and authentication infrastructures [like Active Directory (AD)] were immensely challenging to perform.…

3 months ago

Managing Enterprise Risk and Prioritizing Cybersecurity Investments

The post Managing Enterprise Risk and Prioritizing Cybersecurity Investments appeared first on Fidelis Cybersecurity.

3 months ago