Vendors and Providers
Vendors and Providers | News, how-tos, features, reviews, and videos
Palo Alto Networks announces new SD-WAN features for IoT security, compliance support
Palo Alto Networks is introducing advanced URL filtering to help prevent unknown and evasive man-in-the-middle (MitM) and SaaS platform phishing attacks.
DNS data shows one in 10 organizations have malware traffic on their networks
Akamai report highlights how widespread malware threats remain, noting the dangers of threats specific to DNS infrastructure.
Microsoft Intune Suite consolidates endpoint management and protection
Intune Suite will streamline endpoint management with added features for controlled and secure access.
Microsoft tells Exchange admins to revert previously recommended antivirus exclusions
The antivirus exclusion might cause Exchange Server failures or prevent the detection of backdoors planted by attackers.
5 biggest risks of using third-party services providers
Here's how outsourcing business services to a third-party provider might present risk to security, reputation, and regulatory compliance.
Why you might not be done with your January Microsoft security patches
Microsoft released a flurry of security patches and updates in January, so it would be easy to overlook these two.
Attackers move away from Office macros to LNK files for malware delivery
Barriers that Microsoft has placed to prevent malicious macros has forced some cybercriminals to use LNK files for malware delivery, but at the cost of easier detection.
Nvidia targets insider attacks with digital fingerprinting technology
A new AI-based system from Nvidia sniffs out unusual behavior and ties it to users, in an effort to prevent insider attacks and protect digital credentials.
Why it's time to review your on-premises Microsoft Exchange patch status
Microsoft's recent Patch Tuesday addressed some Exchange Server vulnerabilities, but other steps might be needed to fully secure it.
Microsoft Exchange ProxyNotShell vulnerability explained and how to mitigate it
Understand why ProxyNotShell is different from Proxyshell and why mitigation advice has changed.
Microsoft's rough 2022 security year in review
The ubiquity of Microsoft technology in organizations big and small make it a target for attack. These are the most important vulnerabilities and fixes from 2022 that admins need to know.
Apple finally adds encryption to iCloud backups
Apple has rolled out a number of security features that will now offer end-to-end encryption to protect data, including backups, contacts, notes, photos, and wallet passes. The company also announced hardware Security Keys for Apple...
8 things to consider amid cybersecurity vendor layoffs
Cybersecurity vendor layoffs raise several issues for CISOs and customers, not the least of which are security and risk-related factors. Here are 8 things to consider if your security vendor has announced significant staff cuts.
Build a mature approach for better cybersecurity vendor evaluation
Establishing a thorough, well-planned in-house strategy for assessing cybersecurity vendors and their products is a hallmark of an organization’s maturity and can avoid hassles, headaches, and unnecessary expense.
Jamf buys ZecOps to bring high-end security to Apple enterprise
ZecOps protects world-leading enterprises, governments, and individuals; Jamf has acquired it to help secure the enterprise.
Most common SAP vulnerabilities attackers try to exploit
Unpatched systems, misconfigurations and vulnerable custom code are making SAP environments a top target for cyberattacks.
Apple pushes out emergency updates to address zero-day exploits
Apple has encouraged users of older mobile and desktop devices to update their software ASAP, as a vulnerability could allow an attacker to take complete control of older Apple devices.
Facebook agrees to settle class action lawsuit related to Cambridge Analytica data breach
The four-year-old lawsuit claimed Facebook allowed the British political consulting firm access to private data of over 80 million users.