Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

August 2021

The emerging threat of the cyber pandemic and building a resilient PAM strategy

In this on-demand webinar, our security experts will delve into the emerging cyberthreat trends and core security frameworks, such as Zero Trust and the principle of least privilege (PoLP) to help build a sustainable, foolproof PAM program for your enterprise. In this on-demand webinar, our security experts will delve into the emerging cyberthreat trends and core security frameworks, such as Zero Trust and the principle of least privilege (PoLP) to help build a sustainable, foolproof PAM program for your enterprise.

Five worthy reads: Differential privacy-what it means for businesses

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we explore one of the evolving privacy-enhancing techniques called differential privacy and how it’s being leveraged by organizations to safeguard sensitive data from being exposed. Cutting-edge technologies based on artificial intelligence and machine learning have been gaining traction in recent years.

Securing endpoints, part 1: Ensuring hackers don't manipulate your browsers to carry out attacks

In a world of automation, computers and the data on them have become the backbone of many organizations. But data is a double-edged sword. It can be leveraged by organizations to improve operations, but in the wrong hands, it can be a deadly weapon for hackers. So how do organizations ensure their data is safe?

Enable multi-factor authentication for Outlook Web App logins and secure enterprise emails

In March this year, organizations employing Microsoft Exchange were in for a shock when Microsoft announced that a hacker group was gaining access to organizations’ email accounts through vulnerabilities in its Exchange Server email software. The group tried to gain information from defense contractors, schools, and other establishments in the U.S.

Five worthy reads: The never-ending love story between cyberattacks and healthcare

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the legacy between the healthcare industry and cyberattacks, the vulnerable points in the healthcare system, and how risks can be mitigated. Did you know that for 10th year in a row, the healthcare industry has seen the highest impact from cyberattacks of any industry?