Uros

Enhance security posture with Forcepoint Advanced Malware Detection and Protection (AMDP)

Organizations understand these risks and are taking steps to mitigate their exposure and withstand the storm. The question is, what type of storm are they preparing for, a spring shower or a hurricane? Organizations preparing for a worst-case scenario will upgrade and bolster their defenses and may upgrade from a firewall to Next-Generation Firewall (NGFW), […]

Enhance security posture with Forcepoint Advanced Malware Detection and Protection (AMDP) Read More »

The Magical Implementation – It Pays To Advertise

Dana McMullan    ·      Tuesday, April 4th, 2023 A magical and practical series of tips, tricks, and a real-world guide to implementing impactful end user technologies at scale (Based on a Data Classification implementation but applicable to most large End User Impact implementations) Preface Dana McMullan is founder of Pasteboard Consulting, LLC specializing in End User

The Magical Implementation – It Pays To Advertise Read More »

A PAM Innovation Story: How Privilege Management for… | BeyondTrust

In 2023, cyberattacks are as prevalent and costly as ever. In their 2022 Cost of a Data Breach report, IBM Security reported that 83% of organizations have experienced multiple data breaches between March of 2021 and March of 2022. The report further states that it takes an average $4.35 million and 277 days to identify

A PAM Innovation Story: How Privilege Management for… | BeyondTrust Read More »

3CXDesktopApp Backdoored in a Suspected Lazarus Campaign  

Table of Contents Introduction The attack involved a compromised version of the 3CX VoIP desktop client, which was used to target 3CX’s customers. The compromised 3CX application is a private automatic branch exchange (PABX) software and is available for Windows, macOS, Linux, Android, IOS and Chrome. Currently, there are reports of attacks for both Windows

3CXDesktopApp Backdoored in a Suspected Lazarus Campaign   Read More »

The Value of Micro Focus to OpenText – Analysts Weigh In

The size and scope of the OpenText acquisition of Micro Focus makes the deal newsworthy, and industry pundits have generally greeted the news with optimism. The strategic value for OpenText spans a range of market opportunities, as evidenced by the recent assessments of three analysts who cover the tech market. This blog takes a closer

The Value of Micro Focus to OpenText – Analysts Weigh In Read More »

Cyber-Physical Systems Attacks and Saving Rhinos: The Ultimate Comic Book

Cyber-Physical Systems Attacks and Saving Rhinos: The Ultimate Comic Book Noor Boulos Over the years, cybersecurity has been the subject of blockbuster movies, page-turning novels, shocking memoirs and mind-boggling documentaries. And it remains a fascinating subject no matter how you look at it. Fact or fiction. Good guys or bad guys. Industry or government. There’s

Cyber-Physical Systems Attacks and Saving Rhinos: The Ultimate Comic Book Read More »

Forcepoint Named a “Top Player” in the Radicati Group: Data Loss Prevention Market Quadrant 2023 Report

Top Players are “…the current market leaders with products that offer, both breadth and depth of functionality, as well as possess a solid vision for the future.”   The report evaluates vendors on functionality and breadth of vision, with the highest rated vendors placed in the “Top Player” quadrant.  Security professionals sometimes complain that DLP is

Forcepoint Named a “Top Player” in the Radicati Group: Data Loss Prevention Market Quadrant 2023 Report Read More »

ACSC Essential 8 Cybersecurity Strategies, Maturity Levels, and Best Practices

Table of Contents Originally published in 2017 as an evolution of the Australian Signals Directorate’s Strategies to Mitigate Cyber Security Incidents, the Australian Cyber Security Centre (ACSC) Essential 8 (E8) consists of a set of strategies that can make it harder for threat actors to compromise a firm’s cybersecurity defenses. This blog examines specific aspects

ACSC Essential 8 Cybersecurity Strategies, Maturity Levels, and Best Practices Read More »

Tackling the Challenge of Actionable Intelligence Through Context

Recognition of the importance of threat intelligence has been building for years. But it has taken center stage as the acceleration of digital transformation and the shift to hybrid work models have expanded the attack surface, and geopolitical events have raised the stakes for defenders to protect critical infrastructure and sensitive data. Government leaders are

Tackling the Challenge of Actionable Intelligence Through Context Read More »