Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

NC Protect: Advanced Data Protection for Govt, Defense & Supply Chain in Microsoft 365 Applications

Empower your organization to take advantage of all the productivity and collaboration the Microsoft suite has to offer with meeting regulations including NIST, CMMC, and ITAR for information security. archTIS’ zero trust attribute-based access control (ABAC) powered information security solutions for public sector enhance native security capabilities to empower secure collaboration within your agency, with other agencies, defense, multinational coalitions and supply chain partners.

What is Attribute Based Access Control or ABAC?

The complete portfolio of archTIS solutions, including NC Protect and Kojensi, leverage a data-centric, attribute-based access control (ABAC) methodology to ensure the highest levels of data protection. Watch this video to learn about the advantages of using ABAC-enabled access and data protection policies to safeguard sensitive data.

Akira Ransomware, 8Base Ransomware, and more: Hacker's Playbook Threat Coverage Round-up: August 22, 2023

In this version of the Hacker’s Playbook Threat Coverage round-up, we are highlighting newly added coverage for several recently discovered or analyzed ransomware and malware variants, including Akira ransomware, 8base ransomware, and Rorschach (BabLock) ransomware, amongst others. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s Playbook™ to ensure coverage against these advanced threats.

CyberArk Global CIO on Balancing AI Opportunities and Risks

Generative artificial intelligence (AI) has officially arrived at the enterprise and is poised to disrupt everything from customer-facing applications and services to back-end data and infrastructure to workforce engagement and empowerment. Cyberattackers also stand to benefit: 93% of security decision makers expect AI-enabled threats to affect their organization in 2023, with AI-powered malware cited as the No. 1 concern.

Introducing BinLib: Your private binary library

Binary Library, or “BinLib”, is a collection of data and metadata pertaining to executable binaries, such as EXE or ELF files, that have been observed within your organization(s). When enabled, this extension collects observed data into your own private collection of historical executables, then subsequently available for searching, tagging, and analysis. BinLib also features YARA scanning, allowing you to import rules and search across observed executables - all without impacting system resources or production systems.

Leveraging AT&T Cybersecurity Consulting for a robust Zero Trust Center of Excellence

As cybersecurity becomes increasingly complex, having a centralized team of experts driving continuous innovation and improvement in their Zero Trust journey is invaluable. A Zero Trust Center of Excellence (CoE) can serve as the hub of expertise, driving the organization's strategy in its focus area, standardizing best practices, fostering innovation, and providing training.

WatchGuard Honored in ChannelPro Network's 2023 Readers' Choice Awards

Today, we are excited to share that WatchGuard has again been recognized in the “Best Network Security Vendor” category of ChannelPro Network’s annual Readers’ Choice Awards! The vendors and distributors honored in the 2023 ChannelPro Readers’ Choice Awards program were selected by ChannelPro Network’s magazine readers and visitors to the publication’s website.