Vendors and Providers
Vendors and Providers | News, how-tos, features, reviews, and videos
RSA: Cisco launches SASE, offers roadmap for other cloud-based services
New Cisco services aim to simplify security operations with new as-a-service offerings.
Microsoft security vulnerabilities drop after five-year rise
While elevated privilege attacks remain a critical security concern when using Microsoft products, a new report says that the raw number of vulnerabilities is dropping.
Protecting on-premises Microsoft servers
Many organizations still have on-premises Microsoft Exchange, SharePoint, or Office servers with inadequate protections.
Take LAPSUS$ teens seriously
After the Okta breach, LAPSUS$ is already back making trouble using low-tech techniques with a high rate of success.
Palo Alto launches cloud-native firewall service for AWS
Cloud NGFW for AWS enables organizations to shift security responsibility to Palo Alto, allowing them to speed cloud innovation while remaining secure, the vendor says.
LAPSUS$ ransomware group claims Okta breach
The ransomware group claims that it has had access to customer records since January 2022; Okta says there is no evidence of ongoing malicious activity.
Supply chain vulnerability allows attackers to manipulate SAP transport system
The vulnerability permits malicious interference in the SAP change management and software deployment processes. SAP issues patch to protect file system from exploitation.
Microsoft touts first PCs to ship natively with secure Pluton chip
Along with thwarting malware, the Pluton chip handles BitLocker, Windows Hello, and System Guard and might help prevent physical insider attacks. The technology is also being used in Azure Sphere in the cloud.
The 10 most powerful cybersecurity companies
What makes these 10 security vendors the biggest power players? We break it down.
The most dangerous (and interesting) Microsoft 365 attacks
APT groups are developing new techniques that allow them to avoid detection and exfiltrate hundreds of gigabytes of data from emails, SharePoint, OneDrive, and other applications.
AWS, Google Cloud, and Azure: How their security features compare
Each cloud platform differs in the security tools and features it offers customers to help them protect their cloud assets.
What CISOs really want from security vendors
Less risk? Better security? Value for dollars spent? Check, check, and check. But of all the things CISOs want from security vendors, trusted partnership tops the list. Here's how leading CISOs find and foster those relationships.
The Microsoft Exchange Server hack: A timeline
Research shows plenty of unpatched systems remain. Here's how the attacks unfolded, from discovery of vulnerabilities to today's battle to close the holes.
Sponsor Podcast in partnership with Microsoft
Episode 4: Reduce SOC burnout
Episode 4 - Listen to the podcast to learn more about the expanding threat landscape and how security leaders can reduce SOC burnout and enable security teams to be proactive and preventive threat hunters with a modern threat...
Sponsor Podcast in partnership with Microsoft
Episode 3: The Zero Trust Model
Episode 3: In this episode, we look at the steps organizations are taking toward Zero Trust and provide recommendations for making the most of a Zero Trust model to reduce risk while helping employees be more productive, regardless...
How to patch Exchange Server for the Hafnium zero-day attack
Admins in many businesses report indicators of compromise from an Exchange zero-day vulnerability. Don't assume you're not a target. Investigate for signs of the attack and patch now.
Chinese cyberespionage group hacks US organizations with Exchange zero-day flaws
Microsoft believes Chinese APT group Hafnium is using a set of previously unknown Exchange Server vulnerabilities to access mailbox contents and perform remote code execution.
The .NET patch failure that wasn’t
This month’s patch updates from Microsoft have caused few problems, and though there were some issues related to .NET, even those have been scattered.