Author: admin
Protecting the Most Dangerous Door to Data Loss
Email is the most popular threat vector for attackers to use for delivering malware to an organization. Email is also a direct line of contact between users and cybercriminals, leading […]Why Cybersecurity Cannot Be Separated from National Security
In the episode, Alperovitch brings a particularly important perspective to the table as we think about threats like ransomware or supply chain attacks. To decontextualize the technology from politics is […]Essential Cybersecurity Survival Strategies for 2022 & Beyond (New Guide!) | BeyondTrust
In cyberspace, there exists no safe harbor. Every organization with a digital presence is exposed like an island amidst an angry, implacable ocean that seems to send wave after wave […]Emotet Re-emerges with Help from TrickBot
Emotet has recently reemerged after being taken down less than a year ago by global law enforcement as coordinated by Europol and Eurojust. The takedown was achieved after law enforcement […]Supporting Society’s Biggest Challenges: Our Year in Review
The year 2021 has been a significant one. Never before has the need to create a more sustainable, inclusive world been more relevant – as governments, communities and businesses continue […]The Second Building Block for the SOC of the Future: An Open Integration Framework
The SOC of the future must be data driven, so it’s essential that systems and tools can work together As we turn the page on another year and read the […]2021 Malware Report: The Looming Ransomware Threat
With high-profile malware and ransomware attacks capturing recent headlines, organizations have elevated this problem to a top priority,” said Holder Schulze, founder, Cybersecurity Insiders. The study, a joint ventureTechnical Analysis of CVE-2021-1732
The vulnerability, CVE-2021-1732, is a win32k window object type confusion leading to an OOB (out-of-bounds) write which can be used to create arbitrary memory read and write capabilities within the […]BeyondTrust Named a 2021 Gartner Peer Insights™ Customers’ Choice
BeyondTrust is thrilled to share that we have been recognized as a ‘Customers’ Choice’ in the December 2021 Gartner Peer Insights ‘Voice of the Customer’ for the Privilege Access Management […]Log4Shell – Follow This Multi-Layered Approach for Detection and Remediation
Since the Log4Shell vulnerability was first discovered, Qualys has analyzed and responded to the threat in a systematic way approaching it from all angles – detection, mitigation and remediation. Recognizing […]Load More