endpoints
Prepare for the Security Resilience Onslaught
As we get ready for the upcoming RSA Conference, I gave some thought to what the industry marketing machinery will be hyping, and in looking at my inbox for clues, I saw ...
Don’t Let Your Business Be Held For Ransom(ware)
The ongoing crisis in Ukraine has been headline news for the past few months. From a cybersecurity point of view, it is painfully clear that current conditions favor cybercriminals; legitimate organizations are ...
3 Alert Sources That Will Keep Your SOC Busy and Welcome Automation in 2021
With the work-from-home shift showing little signs of letting up and new IT spending habits taking shape, organizations should prepare... The post 3 Alert Sources That Will Keep Your SOC Busy and ...
Phishing, the 3000 lb. Gorilla
SlashNext Threat Intelligence research team identified +3000% increase in COVID-19 themed phishing URLs since March 15, 2020 ...
Bolstering Corporate Security Post-COVID-19
In the new work-from-home reality, corporate security paradigms, and attitudes, must change The COVID-19 pandemic continues to affect the world in many ways, both health-wise and from a business standpoint. As we ...
Qualys Delivers on Promise to Automate Endpoint Security
Qualys this week announced the availability of a Vulnerability Management, Detection and Response (VMDR) platform based on a single agent that detects endpoint vulnerabilities and automates the patching of those systems. Sumedh ...
3 Steps to Controlling Access Inside the Network
As traffic on the network increases, so do potential vulnerabilities. Network access should be managed more tightly to keep data secure. For years, IT security has been focused primarily on defending the ...
Using Behavioral Analytics to Fight Ransomware
The recent attacks on the City of Baltimore and the Norsk Hydro energy facility in Norway are among the latest incidents that show that ransomware, a part of a larger range of ...
Security’s Greatest Enemy: Endpoints Disguised as ‘Stuff’
When considering the security of the devices that make up the internet of things (IoT), all endpoints must be considered in the risk equation. For years the standard model for non-traditional IT ...