Author: admin
Tis the Season for Formula E Racing
Micro Focus recently renewed our technical partnership with Jaguar TCS Racing for Season 9 of the ABB FIA Formula E Championship. The start of the season is just around the […]Implement Risk-Based Vulnerability Management with Qualys TruRisk™ : Part 2
This blog is a continuation of our first blog on implementing risk-based vulnerability management with Qualys TruRiskTM. In the first blog, we covered how to correctly tag and categorize assets […]The Phishers Greatest Ally
In an effort to keep our customers up to speed on the latest trends when it comes to fraud detection and prevention, ThreatMark presents our phishing blog series: Don’t Take […]Tis’ the Season to Read the Hottest Topics
Tis’ the Season to Read the Hottest Topics Julia Weifenbach If you find yourself searching for something to summarize the year, you’ve come to the right place. We’ve got you […]Five Steps to Simplifying Zero Trust Security with Data-first SASE
For example, many organizations already have investments in Web Security or Cloud Security, but don’t yet have Zero Trust Network Access (ZTNA) capabilities. Identifying where you want to go with […]Credentials Flagged as Leading Cause of Malicious… | BeyondTrust
Since the publication of the first of the Notifiable Data Breach reports by the Office of the Australian Information Commissioner (OAIC), following the introduction of the scheme in 2018, credentials […]Operationalizing Qualys VMDR With Qualys TruRisk™ – Part 1
For today’s CISOs, managing cyber risk is Job #1 priority, and it’s a full-time concern. Security practitioners are spending a considerable amount of time responding to cybersecurity threats and finding […]Removing the Barriers to Security Automation Implementation
Implementation of security automation can be overwhelming, and has remained a barrier to adoption Previously, I wrote about balancing security automation and the human element to accelerate security automation initiatives. EquallyForcepoint Data Visibility—Shine a Light on Dark Data
How can you protect data you effectively can’t even see?” This worthless data is often called “dark data.” What makes it a difficult problem for most organizations is the sheer […]Lookout and Fortra Partner to Secure Sensitive Data Across the Enterprise
Fortra Webmaster · Thursday, December 1st, 2022 Editor’s Note: This blog post was co-authored by Clayton Barnard, Senior Director, Global Alliances at Lookout, and Corey Markell, Associate Director, Strategic Resource […]Load More