Vendors and Providers

Vendors and Providers | News, how-tos, features, reviews, and videos

manager scanning workforce data via antimalware picture id1022805724
3 security vendors

Cybersecurity  >  locked binary code

Jamf buys ZecOps to bring high-end security to Apple enterprise

ZecOps protects world-leading enterprises, governments, and individuals; Jamf has acquired it to help secure the enterprise.

SAP sign

Most common SAP vulnerabilities attackers try to exploit

Unpatched systems, misconfigurations and vulnerable custom code are making SAP environments a top target for cyberattacks.

apple logo red

Apple pushes out emergency updates to address zero-day exploits

Apple has encouraged users of older mobile and desktop devices to update their software ASAP, as a vulnerability could allow an attacker to take complete control of older Apple devices.

Cover image for how much data does facebook use article

Facebook agrees to settle class action lawsuit related to Cambridge Analytica data breach

The four-year-old lawsuit claimed Facebook allowed the British political consulting firm access to private data of over 80 million users.

keeping the cloud secure cloud security lock padlock private cloud

AWS, Google Cloud, and Azure: How their security features compare

Each cloud platform differs in the security tools and features it offers customers to help them protect their cloud assets.

Microsoft Office logo within an environment of abstract binary code with shield and lock.

Attacks using Office macros decline in wake of Microsoft action

Researchers see 66% decline in attacks over eight months since Microsoft turned off macros by default.

Microsoft > Excel [Office 365]

How to manage Microsoft's Excel and Office macro blocking

Microsoft's reversal of its blocking by default on Excel macros creates an opportunity to improve policies and processes around Excel and Office macro use.

Apple Lockdown Mode

Apple slaps hard against ‘mercenary’ surveillance-as-a-service industry

The company is introducing Lockdown Mode to protect high-risk individuals against corrosive surveillance and attacks, and investing millions to improve protection on its devices.

spyware alert notification

Italian spyware firm is hacking into iOS and Android devices, Google says

RCS Lab spyware uses known exploits to install harmful payloads and steal private user data, according to a Google report.

Multifactor authentication  >  Mobile phone verification of a permission request for laptop login.

Best practices for deploying multi-factor authentication on Microsoft networks

Microsoft will soon mandate MFA for some customers, and these are the key considerations before you deploy it.

Tech Spotlight   >   Cloud [CSO]   >   Conceptual image of laptop users with cloud security overlay.

RSA: Cisco launches SASE, offers roadmap for other cloud-based services

New Cisco services aim to simplify security operations with new as-a-service offerings.

Microsoft logo

Microsoft security vulnerabilities drop after five-year rise

While elevated privilege attacks remain a critical security concern when using Microsoft products, a new report says that the raw number of vulnerabilities is dropping.

network security lock and cables

Protecting on-premises Microsoft servers

Many organizations still have on-premises Microsoft Exchange, SharePoint, or Office servers with inadequate protections.

lion cub parent teaching child nature animal growl yawn

Take LAPSUS$ teens seriously

After the Okta breach, LAPSUS$ is already back making trouble using low-tech techniques with a high rate of success.

cloud security / data protection / encryption / security transition

Palo Alto launches cloud-native firewall service for AWS

Cloud NGFW for AWS enables organizations to shift security responsibility to Palo Alto, allowing them to speed cloud innovation while remaining secure, the vendor says.

cso security hacker breach privacy ransomware malware attack gettyimages 1216075693 by towfiqu aham

LAPSUS$ ransomware group claims Okta breach

The ransomware group claims that it has had access to customer records since January 2022; Okta says there is no evidence of ongoing malicious activity.

Eyeglasses rest on a binary field / code review / threat assessment / check vulnerabilities

Supply chain vulnerability allows attackers to manipulate SAP transport system

The vulnerability permits malicious interference in the SAP change management and software deployment processes. SAP issues patch to protect file system from exploitation.

thinkstockphotos 499123970 laptop security

Microsoft touts first PCs to ship natively with secure Pluton chip

Along with thwarting malware, the Pluton chip handles BitLocker, Windows Hello, and System Guard and might help prevent physical insider attacks. The technology is also being used in Azure Sphere in the cloud.

Load More
You Might Also Like