Friday, April 3, 2020
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST
Home News

News

Hackers target zero-day flaws in enterprise Draytek network devices

0
Experts from Qihoo 360's NetLab recently spotted two zero-day campaigns targeting DrayTek enterprise-grade networking devices.Since December 2019, researchers from Qihoo 360 observed two different attack groups that are employing two zero-days exploits to take over DrayTek enterprise routers to eavesdrop...

TEHTRIS XDR Platform, A Holistic Cybersecurity Solution

0
By Laurent Oudot, Founder, CEO at TEHTRISTEHTRIS is the European cybersecurity company that has designed and deployed the smart and holistic TEHTRIS XDR Platform in more than 50 countries within heterogeneous, international and distributed infrastructures. In 2019, TEHTRIS captured...

China-linked APT41 group exploits Citrix, Cisco, Zoho flaws

0
The China-linked group tracked as APT41 exploited vulnerabilities in Citrix, Cisco, and ManageEngine in a campaign on a global scale.The China-linked cyberespionage group tracked as APT41 exploited vulnerabilities in Citrix, Cisco, and Zoho ManageEngine in a campaign on...

Thought Leaders Discuss the “Human Element” at RSA Conference 2020

0
San Francisco, CA. – The theme at RSA Conference 2020 focused on “The Human Element,” highlighting the current trend toward focusing on end-user experience, vulnerability, and empowerment throughout the InfoSec industry.During the conference, Olivier Vallez and I had the...

Enterprises Demand MSSPs Offering MDR Services Through Cybersecurity Convergence

0
By Arun Gandhi, Director of Product Management of the SeceonEnterprises from all verticals are embracing digital transformation. This new, increasingly connected digital world is bringing tremendous efficiencies to the way we do business. Apart from these advantages, the digital...

Coronavirus scams, found and explained

0
By David RuizCoronavirus has changed the face of the world, restricting countless individuals from dining at restaurants, working from cafes, and visiting their loved ones. But for cybercriminals, this global pandemic is expanding their horizons.In the past week, Malwarebytes...

Demystifying Network Investigations with Packet Data

0
By Michael Morris, Director of Global Technologies Alliances and Business Development, EndaceA common challenge for security analysts, network operations and application teams is lacking the right data to troubleshoot security or performance issues quickly and conclusively. Typically, analysts are...

CASB+Is Essential Infrastructure for The Cloud Mobile Digital Transformation

0
By Salah, VP of Marketing at CipherCloudThe ongoing cloud mobile digital transformation has brought cloud access security brokers (CASB+) front and center as an important part of enterprise cloud mobile security architectures. This article will take a closer look...

Securing the Next Generation Data Center

0
By Dr. Ratinder Paul Singh Ahuja, Chairman of the Board & Chief R&D Officer ShieldX Networks                                                                                                         Securing Cloud-Generation Data Centers As many firms transition their data centers into the cloud and/or heavily virtualized environments, the old practice of securing the...

Is Data Loss Prevention (DLP) Really Dead?

0
By Uzi Yair, Co-founder GTB Technologies, Inc.I recently came across several digital security vendor sites that describe themselves as a “DLP alternative.”Perusing through their pages, I came across comments such as “DLP is hard to deploy”, “DLP is hard...

STAY CONNECTED

35,548FansLike
55,892FollowersFollow