Uros

The Benefits of a Comprehensive Federal Data Protection Law for the United States, Part 2

It’s no surprise, then, that governments are increasingly interested in enacting data protection legislation. In fact, 61 percent of consumers believe laws have a positive impact on protecting privacy, the Cisco survey found. Consumers and citizens increasingly value data protection, as a growing number of studies show. For instance, 76 percent of consumers say they […]

The Benefits of a Comprehensive Federal Data Protection Law for the United States, Part 2 Read More »

How to Implement Effective Incident Response Plans to… | BeyondTrust

A day rarely passes anymore without hearing about another cyberattack, a new data breach, ransomware, extortion, or nation-state espionage uncovered by public and private sector security teams. A recent research report by Check Point found that the number of cyberattacks increased 38% from 2021 to 2022, and other industry reports have note similar increases. The

How to Implement Effective Incident Response Plans to… | BeyondTrust Read More »

Inspecting affected clients of 3CX DLL sideloading attack with IOTA

At the end of March 2023, a supply chain attack on VoIP manufacturer 3CX became known. Their software is used by approximately 600,000 companies and 12 million users, including Mercedes-Benz, McDonald’s, Coca-Cola, IKEA, and BMW. 3CX’s Windows and macOS desktop app (also known as Electron) was allegedly shipped with a signed but tampered library by the

Inspecting affected clients of 3CX DLL sideloading attack with IOTA Read More »

The Importance of Network Visibility in Modern Healthcare

Following our attendance at the HIMSS23 healthcare summit, it was inevitable to discuss the connection between digital transformation in healthcare and Niagara Networks’ visibility solutions. It’s a fact that the healthcare industry is rapidly shifting towards digitization, with the rise of electronic health records, telemedicine, and other digital technologies completely transforming healthcare delivery. A report

The Importance of Network Visibility in Modern Healthcare Read More »

ThreatQ Academy Drives User Success and Immediate ROI for Clients and Partners

ThreatQ Academy Drives User Success and Immediate ROI for Clients and Partners Charlie Hanner The tech sector, in general, is often far too focused on speeds and feeds to the detriment of the end goal, driving overall customer success. And the cybersecurity industry is no exception. Vendors tout a laundry list of features and functions

ThreatQ Academy Drives User Success and Immediate ROI for Clients and Partners Read More »

High stakes as the Department of Defense adopts modern Zero Trust strategies

Forcepoint recently sponsored a GovExec TV dispatch from the Rocky Mountain Cyberspace Symposium 2023.  In the interview top DOD leaders, including Lieutenant General Robert Skinner—Director of DISA Commander Joint Force Headquarters Department of Defense information network (DODIN) and Colonel Jennifer Krolikowski is Chief Information Officer Space Systems Command discussed the lessons learned and innovation happening

High stakes as the Department of Defense adopts modern Zero Trust strategies Read More »

Enforce Least Privilege with the Least Effort: A PAM… | BeyondTrust

BeyondTrust is constantly introducing new features and enhancements to Privilege Management for Windows and Mac that help you achieve least privilege with the least effort required. Whether it’s ease of deployment, streamlined policy refinement, or comprehensive integrations, we’re constantly innovating to make achieving least privilege simple for organizations that often have understaffed and overstretched security

Enforce Least Privilege with the Least Effort: A PAM… | BeyondTrust Read More »

Qualys Launches Inaugural Cyber Risk Summit to Share Expert Insights

Table of Contents Cybersecurity professionals from all over are making their way to RSA’s annual conference this week in search of inspiration and expert advice on bolstering their security postures. But for those who could not disrupt their schedules to make the trip, Qualys is providing IT and security practitioners with an easy way to

Qualys Launches Inaugural Cyber Risk Summit to Share Expert Insights Read More »

From Threat Intelligence to Data-Driven Use Cases, the Evolution of Security Automation

From Threat Intelligence to Data-Driven Use Cases, the Evolution of Security Automation Julia Weifenbach Dave Krasik, Director of Product Management at ThreatQuotient, recently had a chance to speak with Ed Amoroso, CEO and founder of TAG Cyber, a leading cybersecurity advisory group, about the state of cybersecurity automation. They covered a lot of ground, and

From Threat Intelligence to Data-Driven Use Cases, the Evolution of Security Automation Read More »