Author: admin
SWG: The Third Key Component of an SSE Platform
As part of the Forcepoint ONE SSE platform, our SWG can use the same advanced threat protection and data security technologies that our Cloud Access Security Broker (CASB) and Zero […]Applying Access Control Lists in the Cloud
What is an Access Control List? An Access Control List (ACL) provides a security mechanism to define who or what has access to your assets, buckets, network, storage, file, etc. […]Assessing Certificate Risk with Qualys VMDR
Digital certificates and SSL are everywhere. However, managing an accurate inventory of all current certificates in use across your enterprise is an ongoing challenge. This blog examines the scale of […]When Attacks Surge, Turn to Data to Strengthen Detection and Response
News of cyber criminals and nation-state actors capitalizing on events, planned or unplanned, for financial gain or to wreak havoc have dominated the headlines over the past few years. From […]The Axeda Vulnerability and Lessons Learned | BeyondTrust
In March, a vulnerability that impacts Parametric Technology Corporation’s (PTC) Axeda agent and Axeda Desktop Server was announced. The Cybersecurity and Infrastructure Security Agency (CISA) issued advisory ICSA-22-068-01 stating that […]April 2022 Patch Tuesday: Microsoft Releases 145 Vulnerabilities with 10 Critical; Adobe Releases 4 Advisories, 78 Vulnerabilities with 51 Critical.
Microsoft Patch Tuesday Summary Microsoft has fixed 145 vulnerabilities, including 17 Microsoft Edge vulnerabilities, in the April 2022 update, with ten (10) classified as Critical as they allow Remote Code Execution […]The role of Threat Intelligence Platforms in Implementing Extended Detection and Response
The role of Threat Intelligence Platforms in Implementing Extended Detection and Response GIGI SCHUMM As the new year continues to unfold, cybersecurity budget holders will be deep into the process […]SSE Platforms are Bringing ZTNA to the Mainstream
With ZTNA, users no longer have to remember when to start their VPN—and wrestle with restarting it when it fails. And, by not having a VPN that detours their network […]Recapping Run and Transform
The exciting Micro Focus Universe 2022 conference showcased Micro Focus’ Run and Transform narrative. Derek Britton reflects on what… View Article (Feed generated with FetchRSS) This post was first first […]What is India’s Personal Data Protection Bill?
The EU’s GDPR paved the way for data privacy and protection laws around the world, and one of the latest is the emerging Personal Data Protection Bill in India. While […]Load More