News|Vendors

Adopting an Effective and Easy To Implement Zero Trust Architecture

Table of Contents Security professionals employed by a federal agency, supplier, or regulated private sector firm are often challenged by long lists of required cybersecurity rules that can seem endless and unchanging. White House Executive Orders, FedRAMP requirements, CISA Binding Operational Directives, NIST guidelines, FISMA modernization mandates – and Inspector Generals with local, state, or […]

Adopting an Effective and Easy To Implement Zero Trust Architecture Read More »

Using Threat Intelligence to Get Smarter About Ransomware

Ransomware is rampant. On any given day you can visit your “go to” cybersecurity news source and read about another successful attack or a new malware variant. In fact, research by Proofpoint (PDF) finds that 76% of organizations experienced an attempted ransomware attack in 2022 and 64% were compromised. As a result, ransomware has become

Using Threat Intelligence to Get Smarter About Ransomware Read More »

What is End User Experience Management (EUEM)? | Riverbed

Organizations use End User Experience Management (EUEM) to ensure that their technology systems are functioning effectively when it comes to delivering excellent digital experiences to end users. The goal is to ensure users are able to access the resources they need to perform their jobs (in the case of employees) or to interact with a

What is End User Experience Management (EUEM)? | Riverbed Read More »

Inspecting affected clients of 3CX DLL sideloading attack with IOTA

At the end of March 2023, a supply chain attack on VoIP manufacturer 3CX became known. Their software is used by approximately 600,000 companies and 12 million users, including Mercedes-Benz, McDonald’s, Coca-Cola, IKEA, and BMW. 3CX’s Windows and macOS desktop app (also known as Electron) was allegedly shipped with a signed but tampered library by the

Inspecting affected clients of 3CX DLL sideloading attack with IOTA Read More »

The Importance of Network Visibility in Modern Healthcare

Following our attendance at the HIMSS23 healthcare summit, it was inevitable to discuss the connection between digital transformation in healthcare and Niagara Networks’ visibility solutions. It’s a fact that the healthcare industry is rapidly shifting towards digitization, with the rise of electronic health records, telemedicine, and other digital technologies completely transforming healthcare delivery. A report

The Importance of Network Visibility in Modern Healthcare Read More »

Qualys Launches Inaugural Cyber Risk Summit to Share Expert Insights

Table of Contents Cybersecurity professionals from all over are making their way to RSA’s annual conference this week in search of inspiration and expert advice on bolstering their security postures. But for those who could not disrupt their schedules to make the trip, Qualys is providing IT and security practitioners with an easy way to

Qualys Launches Inaugural Cyber Risk Summit to Share Expert Insights Read More »

Microsoft and Adobe Patch Tuesday April 2023 Security Update Review

Table of Contents Microsoft released security updates to address 114 vulnerabilities in the April Patch Tuesday edition. The security advisories cover various vulnerabilities in different products, features, and roles. Let’s know more about this month’s Patch Tuesday details. Microsoft Patch Tuesday for April 2023 Microsoft has addressed 114 vulnerabilities in this month’s Security Update, including

Microsoft and Adobe Patch Tuesday April 2023 Security Update Review Read More »

Real Time Customer Experience Visibility for Modern ATM Fleets | Riverbed

Modern automatic tellers are packed with sophisticated hardware and software to enable an up-to-date user experience for customers. All this sophistication naturally brings with it some challenges for the banks and IT teams. In this blog, let’s discuss what those pitfalls are and how Riverbed’s Alluvio Aternity Digital Experience Management platform can help with clearer

Real Time Customer Experience Visibility for Modern ATM Fleets | Riverbed Read More »

Looking for a New Security Technology? Choose a Partner, not a Vendor

Previously, I borrowed the concept of carcinization from convergent evolution and applied it to security to talk about how security tools have evolved over time so that product categories are no longer clearly defined. When the walls between endpoint detection and response (EDR) tools and network security technologies begin to crumble, and when categories like extended detection

Looking for a New Security Technology? Choose a Partner, not a Vendor Read More »