resilience edge remote work hybrid

Prepare for the Security Resilience Onslaught

As we get ready for the upcoming RSA Conference, I gave some thought to what the industry marketing machinery will be hyping, and in looking at my inbox for clues, I saw ...
Security Boulevard
SMBs, threats, shutdown SMBs cybercriminals business ransomware malware Kaseya 6 Ways Poor Cybersecurity Hurts Businesses

Don’t Let Your Business Be Held For Ransom(ware)

The ongoing crisis in Ukraine has been headline news for the past few months. From a cybersecurity point of view, it is painfully clear that current conditions favor cybercriminals; legitimate organizations are ...
Security Boulevard
3 Alert Sources That Will Keep Your SOC Busy and Welcome Automation in 2021

3 Alert Sources That Will Keep Your SOC Busy and Welcome Automation in 2021

With the work-from-home shift showing little signs of letting up and new IT spending habits taking shape, organizations should prepare... The post 3 Alert Sources That Will Keep Your SOC Busy and ...
Phishing, the 3000 lb. Gorilla

Phishing, the 3000 lb. Gorilla

SlashNext Threat Intelligence research team identified +3000% increase in COVID-19 themed phishing URLs since March 15, 2020 ...
CISO, CISOs, solarwinds, security, CISO corporate security

Bolstering Corporate Security Post-COVID-19

| | endpoints, PAM, Pandemic, VPAM, VPN
In the new work-from-home reality, corporate security paradigms, and attitudes, must change The COVID-19 pandemic continues to affect the world in many ways, both health-wise and from a business standpoint. As we ...
Security Boulevard
Qualys endpoint

Qualys Delivers on Promise to Automate Endpoint Security

Qualys this week announced the availability of a Vulnerability Management, Detection and Response (VMDR) platform based on a single agent that detects endpoint vulnerabilities and automates the patching of those systems. Sumedh ...
Security Boulevard
perimeter security cybersecurity startups

3 Steps to Controlling Access Inside the Network

As traffic on the network increases, so do potential vulnerabilities. Network access should be managed more tightly to keep data secure. For years, IT security has been focused primarily on defending the ...
Security Boulevard
Microsoft ransomware

Using Behavioral Analytics to Fight Ransomware

The recent attacks on the City of Baltimore and the Norsk Hydro energy facility in Norway are among the latest incidents that show that ransomware, a part of a larger range of ...
Security Boulevard
ARIA Endpoints Disguised as 'Stuff'

Security’s Greatest Enemy: Endpoints Disguised as ‘Stuff’

When considering the security of the devices that make up the internet of things (IoT), all endpoints must be considered in the risk equation. For years the standard model for non-traditional IT ...
Security Boulevard

Secure Guardrails