By Boyd White, Director, Technical Account Management, Tanium Endpoint management is critical as agencies try to…
Categoría: technology
Auto Agregado por WPeMatico
2021 Cybersecurity Outlook: The More Things Change, The More They Stay the Same
By Nir Gaist, Nyotron, Founder Cybersecurity has gone through many phases over the last few decades.…
SAP systems are targeted within 72 hours after updates are released
On-premises SAP systems are targeted by threat actors within 72 hours after security patches are released,…
Firmware attacks, a grey area in cybersecurity of organizations
A new report published by Microsoft revealed that 80% of global enterprises were victims of a…
Protecting Human Rights in The Era of Cyber Information Warfare
By Edwin Weijdema, Global Technologist, Product Strategy at Veeam Disinformation is undermining the limitless potential of…
Ubiquiti security breach may be a catastrophe
The data breach disclosed by Ubiquiti in January could be just the tip of the iceberg,…
Rise of BYOD Once Again
By Nicole Allen, Marketing Executive, SaltDNA. The sudden increase in remote working has ensured that ‘bring your…
4 Matchmaking Tips to Find your Perfect SOC 2 Fit
Finding the right Systems and Organizations Controls (SOC 2) auditor for your organization By Patrick Murray,…
Secure, Managed File Transfer: What’s Old is New Again
Intrigue and Espionage May not Come to Mind when You Think of MFT—But it Should By…
30 Docker images downloaded 20M times in cryptojacking attacks
Experts discovered that 30 malicious Docker images with a total number of 20 million pulls were involved…