Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

What is Digital Proof of Authenticity and why it is the future of digital commerce?(webinar snippet)

Keywords: digital fraud, digital trust, ecommerce security, website spoofing, brand protection. Watch the full interview with David Reilly, Former CIO of Bank of America as he discussed security and fraud issues facing digital commerce in 2023.

Thrilling True Stories of State-Sponsored Cyber Espionage

Ready for true stories of state-sponsored hackers and cyber espionage more riveting than any spy movie? Cue the James Bond theme song! Welcome, agents, to the global spy thriller unfolding right before our eyes. Join me in the enthralling world where politics and security intersect!

ThreatQ Cyber Forum Recap: Expert Insights on Risk-Based Vulnerability Management

The discipline of vulnerability management has been around for decades and the way we assess risk, based on severity and likelihood of exploitation, has remained fairly constant. However, there are challenges in how this formula is usually applied that narrow our perspective on risk and our mitigation strategies.

4 Tips for Effective Cyber Vigilance as Your Attack Surface Expands

Cyberattacks are on the rise. In 2022, there was a 38 percent increase in global attacks compared to the previous year—and security teams are struggling to keep up. It now takes an average of 277 days for teams to identify and contain a breach. With so many alerts being received by the Security Operations Centers (SOCs) each day, how do teams decide which issues to address first?

Reviewing Remote Work Security: Best Practices

Remote work has shifted the mindset away from the old style of employment, showing up to the office every day. However, it seems that more businesses are starting to grab back some of the traditional practice of showing up to the office. The timing is probably helping, as the northern hemisphere is starting to warm up, making the commute to an office slightly more enjoyable. However, as we move towards an in-office presence, it may make us more relaxed about some of the rules of remote working.

Solving Big Networking Problems FAST

Most of the big networking headaches didn’t turn up overnight; they started small and increased in complexity over time, as the network grew and evolved. Without detailed actionable data, these problems can be nearly impossible to solve; at the very least it can take weeks, months, or even years to rid a global network of a pervasive issue.

Harnessing the Managed Services Opportunity: Netskope Unveils New Managed Service Provider (MSP) Program

In today’s service economy, enterprise and mid-market organizations alike are increasingly favoring a managed services model for their advanced technology solutions. To address the heightened demand and evolving procurement trends, we are pleased to announce the new Netskope Managed Service Provider (MSP) Program.

How to Respond: CVE-2023-27997 (Fortigate SSL VPN)

A critical vulnerability in FortiGate SSL VPN could allow hackers to access vulnerable systems and inject malicious code, even if Multi-Factor Authentication (MFA) is enabled. To learn how to identify whether your Fortinet product is impacted and how to quickly secure it, read on. Learn how UpGuard simplifies Vendor Risk Management >