Vendors and Providers

Vendors and Providers | News, how-tos, features, reviews, and videos

CSO  >  Microsoft Office  >  Patches + updates
hand at keyboard with Windows logo

change management in digital transformation internet of things iot and new technology big data and

Palo Alto Networks announces new SD-WAN features for IoT security, compliance support

Palo Alto Networks is introducing advanced URL filtering to help prevent unknown and evasive man-in-the-middle (MitM) and SaaS platform phishing attacks.

hacker laptop digits computer screen cyber crime cyber crime theft money digital

DNS data shows one in 10 organizations have malware traffic on their networks

Akamai report highlights how widespread malware threats remain, noting the dangers of threats specific to DNS infrastructure.

Microsoft announcement/update/news/tips

Microsoft Intune Suite consolidates endpoint management and protection

Intune Suite will streamline endpoint management with added features for controlled and secure access.

cybercrime cyber crime skull symbol project darknet dark web internet safety cyberattack theft viru

Microsoft tells Exchange admins to revert previously recommended antivirus exclusions

The antivirus exclusion might cause Exchange Server failures or prevent the detection of backdoors planted by attackers.

change management in digital transformation internet of things iot and new technology big data and

5 biggest risks of using third-party services providers

Here's how outsourcing business services to a third-party provider might present risk to security, reputation, and regulatory compliance.

Microsoft Windows 7 security patches/updates

Why you might not be done with your January Microsoft security patches

Microsoft released a flurry of security patches and updates in January, so it would be easy to overlook these two.

binary code, magnifying lens, skull and crossbones

Attackers move away from Office macros to LNK files for malware delivery

Barriers that Microsoft has placed to prevent malicious macros has forced some cybercriminals to use LNK files for malware delivery, but at the cost of easier detection.

Digital fingerprints are virtually connected. [tracking / identity / genetics / data privacy]

Nvidia targets insider attacks with digital fingerprinting technology

A new AI-based system from Nvidia sniffs out unusual behavior and ties it to users, in an effort to prevent insider attacks and protect digital credentials.

Patch + update options  >  Pixelized tools + refresh symbol with branching paths

Why it's time to review your on-premises Microsoft Exchange patch status

Microsoft's recent Patch Tuesday addressed some Exchange Server vulnerabilities, but other steps might be needed to fully secure it.

security system vulnerabilities - a grid of locks with several unlocked

Microsoft Exchange ProxyNotShell vulnerability explained and how to mitigate it

Understand why ProxyNotShell is different from Proxyshell and why mitigation advice has changed.

Scanning for vulnerabilities.

Microsoft's rough 2022 security year in review

The ubiquity of Microsoft technology in organizations big and small make it a target for attack. These are the most important vulnerabilities and fixes from 2022 that admins need to know.

iCloud key

Apple finally adds encryption to iCloud backups

Apple has rolled out a number of security features that will now offer end-to-end encryption to protect data, including backups, contacts, notes, photos, and wallet passes. The company also announced hardware Security Keys for Apple...

manager scanning workforce data via antimalware picture id1022805724

8 things to consider amid cybersecurity vendor layoffs

Cybersecurity vendor layoffs raise several issues for CISOs and customers, not the least of which are security and risk-related factors. Here are 8 things to consider if your security vendor has announced significant staff cuts.

3 security vendors

Build a mature approach for better cybersecurity vendor evaluation

Establishing a thorough, well-planned in-house strategy for assessing cybersecurity vendors and their products is a hallmark of an organization’s maturity and can avoid hassles, headaches, and unnecessary expense.

Cybersecurity  >  locked binary code

Jamf buys ZecOps to bring high-end security to Apple enterprise

ZecOps protects world-leading enterprises, governments, and individuals; Jamf has acquired it to help secure the enterprise.

SAP sign

Most common SAP vulnerabilities attackers try to exploit

Unpatched systems, misconfigurations and vulnerable custom code are making SAP environments a top target for cyberattacks.

apple logo red

Apple pushes out emergency updates to address zero-day exploits

Apple has encouraged users of older mobile and desktop devices to update their software ASAP, as a vulnerability could allow an attacker to take complete control of older Apple devices.

Cover image for how much data does facebook use article

Facebook agrees to settle class action lawsuit related to Cambridge Analytica data breach

The four-year-old lawsuit claimed Facebook allowed the British political consulting firm access to private data of over 80 million users.

Load More
You Might Also Like