Network Security
The Targeting of the COVID-19 Vaccine Supply Chain
The world has waited for 10 months for the good news that arrived this week—the first inoculations of the COVID-19 vaccine would be given in the UK within days. Those same 10 ...
Security Boulevard
Ensure Your Friends and Family Are Scam Savvy this Holiday Season
Fidelis Cybersecurity Blogs | | Cloud Security, data protection, deception, Endpoint security, Network Detection and Response, Network Security, Threat Detection and Response
The post Ensure Your Friends and Family Are Scam Savvy this Holiday Season appeared first on Fidelis Cybersecurity ...
Register for the Dec 8 RSA Evolution of Identity Summit
The RSA Evolution of Identity Summit will convene thought leaders from across the sector to discuss challenges around cloud and remote workforce security, trends such as Zero Trust, passwordless authentication, and the ...
The Critical Role of Network Detection and Response in Improving Enterprise Security [Q&A with Vito Rallo of PwC]
Bricata | | Blog, Cyber Threats, Cybersecurity, Incident Response, Network Security, network visibility, thought leader interviews, threat detection, Threat Hunting
Vito Rallo is Director of Cyber Incident and Threat Management at PwC. He and his team provide offensive security and incident and threat management services to medium and large enterprises. Prior to ...
The difference between Monitoring and Observability
Legacy methods based on handling predictable failures often do not work well while monitoring modern distributed applications. Efficient debugging and diagnostics require that the system be observable with a microservice architecture now ...
Security and COVID-19: Securing the New Normal
DAVID CANELLOS | | COVID-19, Cybersecurity, Data Security, nework security, Pandemic, remote work, work from home
The year 2020 is likely to go down in history as one of the most memorable and pivotal periods in generations, due to the COVID-19 pandemic that has affected everyone and everything ...
Security Boulevard
Featured Use Case: Why a Large US Utility Company Turned to MixMode to Address Utility Grid Vulnerabilities
A large utility company approached MixMode with the following scenario: The enterprise SOC was utilizing a shared SIEM application that was being utilized by several stakeholders: the networking team, the SCADA team, ...
Securing the Office of the Future
Gary Berman | | cyberattack, CyberHero Adventures: Defenders of the Digital Universe, remote work, work from home
Our latest episode of “The CyberHero Adventures: Defenders of the Digital Universe” focuses on answering the question: How do organizations secure the office of the future? Businesses have demonstrated that they can ...
Security Boulevard
Old Vulnerabilities Open the Door for WannaCry Ransomware
More than three years since it was discovered, WannaCry is still a threat for some organizations, research has found How often does your organization conduct a security assessment? Once a year? Once ...
Security Boulevard
Unisys Adds Visualization Tools to Stealth Platform
Unisys has updated its Stealth platform that automates microsegmentation of networking environments to now include visualization and dashboard tools that make it easier to track an organization’s overall security posture in real-time ...
Security Boulevard

