Author: admin
What is Vendor Privileged Access Management (VPAM)?
Securing Vendor Identities & Access Vendor Privileged Access Management (VPAM) enables vendor identities to securely access an organization’s assets. The role of VPAM is to extend privileged access security best […]Tax Season Scams Are Here Again – How to Mitigate Risk
Tax Season Scams Are Here Again – How to Mitigate Risk AARON LOUKS Ransomware has dominated the headlines the last couple of years. But it might surprise you to hear […]How Three Forcepoint Customers Use DLP for a Competitive Advantage
But securing it from insider threats and external attacks isn’t easy. Information comes in all shapes and sizes, it’s stored far and wide, and it can exit the organization with […]SSE Platforms are Taking CASB to the Next Level
Take, for example, the Cloud Access Security Broker (CASB) capabilities within Forcepoint ONE. Drawing on technology that was a 3-time leader in Gartner’s CASB Magic Quadrant, it plays a crucial […]How to Prepare for 2022 Cyber Insurance Renewals and What to Expect | BeyondTrust
Cyber insurance premiums in 2021 continued to climb to record highs, spurned by a significant spike in successful cyberattacks. According to the Council of Insurance Agents & Brokers, the average […]EDR Is Dead. Long Live Multi-Vector EDR.
News of EDR’s demise has been greatly exaggerated. Fact is: older approaches to EDR have to move over. There’s a new solution now: Multi-Vector EDR. This blog reviews the highlights […]The Importance of Open Source to an XDR Architecture
No longer satisfied with infecting files or systems, adversaries are now intent on crippling entire enterprises. Damaging supply chain, ransomware and wiper attacks are making headline news, impacting not only […]Apple and Meta targeted with forged legal data requests, Triton malware still targeting energy firms, Hackers use MFA tool against Indian government, FBI warns election officials of phishing attacks, Kaspersky poses national security risk, more
Apple and Meta reportedly provided customer data to hackers in response to forged ’emergency data requests.’ Triton malware still targeting energy firms Hackers use modified MFA tool against Indian government […]X2-Series v0.10.0 Release Notes
The newly released X2-Series software version 0.10.0 includes the following: PTPv2 Time Synchronization for Nanosecond Traffic Timestamping MPLS Filtering (up to 6 labels) MPLS Stripping for all labels Spoofing of […]Dark Data: Out of Sight, Out of Mind
Elizabeth Swabey-Keith · Wednesday, March 23rd, 2022 Businesses are creating and collecting more data than ever. Far too much of this data is saved and stored – on file shares, […]Load More