Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Transform your Data Center with Confidence | Joint Webinar by CloudFabrix and Verge.io

Verge.io is partnering with CloudFabrix, a leader in artificial intelligence for IT operations, to chat about why software-defined everything is the way to go. This is a great opportunity to learn how to transform your current data center operations using the latest technology and intelligence. Here’s what we’ll cover: – How artificial intelligence and data center virtualization operating systems work together to change the thinking around traditional data centers.

Will COTS Products Require a CMMC Audit and Certification?

The emerging Cybersecurity Maturity Model Certification (CMMC) will mandate nearly the entire federal government supply chain and over 300,000 contractors to get audited and certified against the CMMC protocol. The caveat is that some organizations that build Commercial-Off-The-Shelf items or Commercially Available Off-The-Shelf (COTS) products for the Department of Defense (DoD) do NOT require a CMMC certificate . However, the devil is in the details!

Detection and response for the actively exploited ProxyShell vulnerabilities

On August 21, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) released an urgent notice related to the exploitation of ProxyShell vulnerabilities ( CVE-2021-31207 , CVE-2021-34473 , CVE-2021-34523 ). By chaining these vulnerabilities together, threat actors are compromising unpatched Microsoft Exchange servers and gaining footholds into enterprise networks.

Ensure data security and compliance in Slack Connect with Nightfall

Slack as a product is constantly expanding with new functionality and integrations. Slack Connect is among the most popular new features Slack introduced in the past year and is growing in popularity because it’s an easy way to stay connected with people you work with outside your organization — in real time with all the features that Slack offers. ​​As new improvements or upgrades for Slack are released, data security and compliance should be a top concern for your teams.

What is Zero Standing Privileges (ZSP)? definition, benefits, and how to achieve it

Zero Standing Privileges (ZSP) is a security model that eliminates always-on privileged access. No user, workload, or system retains persistent elevated permissions. Privileged access is granted only when required, for a limited time and specific scope, and is automatically revoked after use. ZSP reduces attack surface, limits lateral movement, aligns with Zero Trust, and simplifies audits and compliance.

Tessian partners with Optiv Security as part of the company's move to a 100% channel model

Human Layer Security company Tessian today announces that it is moving to a 100% channel model, partnering with leading cybersecurity partners like Optiv Security to help enterprises secure the human layer and protect against threats caused by human error.