featureBatten down the hatches: it’s time to harden every facet of your Windows network Gone are the days when a protected OS kept the bad guys out. Hardening authentication, the help desk, and log files in place is now needed to beat the bad guys.By Susan BradleyNov 22, 20237 minsPhishingWindows SecurityNetwork Security news 9 in 10 organizations have embraced zero-trust security globallyBy John P. Mello Jr.Nov 22, 20234 minsZero TrustNetwork Securitynews analysis AT&T’s mysterious MSSP spinoff could have upsides for its security consulting businessBy Jon GoldNov 21, 20233 minsManaged Service ProvidersNetwork Security opinionDeception technology use to grow in 2024 and proliferate in 2025By Jon Oltsik Nov 13, 20236 minsThreat and Vulnerability ManagementNetwork Security news analysisCisco patches serious flaws in Firepower and Identity Services EngineBy Lucian Constantin Nov 06, 20234 minsNetwork SecurityVulnerabilities news analysisHelloKitty ransomware deployed via critical Apache ActiveMQ flawBy Lucian Constantin Nov 02, 20234 minsRansomwareMalwareNetwork Security newsMicrosoft pledges cybersecurity overhaul to protect products and servicesBy Michael Hill Nov 02, 20239 minsInternet SecurityInternet SecurityInternet Security featureWhat is phishing? Examples, types, and techniquesBy Josh Fruhlinger Nov 02, 202310 minsPhishingSocial EngineeringNetwork Security newsThird Wave Innovations rolls security into all-in-one NOC offeringBy Jon Gold Oct 31, 20233 minsThreat and Vulnerability ManagementNetwork Security Articlesnews analysisRecently patched Juniper firewall flaws allow remote code executionResearchers have chained two medium severity vulnerabilities to execute "world ending" remote code execution, and a real-world exploit has been found. By Lucian Constantin Aug 29, 2023 6 minsRemote Access SecurityNetwork SecurityVulnerabilitiesnewsProxyjacking campaign LABRAT targets vulnerable GitLab deploymentsSophisticated attack employs stealthy and evasive techniques and tools to make defense and detection more challenging.By Lucian Constantin Aug 17, 2023 5 minsHackingGitLabNetwork SecuritynewsCheck Point beefs up SASE offering with $490M Perimeter 81 acquisitionCheck Point Software will integrate Perimater 81's zero trust network access and rapid deployment technology into its existing Infinity product architecture.By Jon Gold Aug 10, 2023 3 minsZero TrustMergers and AcquisitionsNetwork Securitynews analysisIBM launches open-source detection and response framework for MFT attacksThe goal is to help defenders more quickly detect attacks enabled by managed file transfer application vulnerabilities and provide an incident response playbook.By Lucian Constantin Aug 09, 2023 5 minsCyberattacksNetwork SecurityVulnerabilitiesnews analysisAttackers use Cloudflare Tunnel to proxy into victim networksExploiting Cloudflare Tunnel requires little skill and potentially could compromise and entire network.By Lucian Constantin Aug 08, 2023 6 minsCyberattacksCloud SecurityNetwork SecuritynewsKubernetes clusters under attack in hundreds of organizationsMalware and backdoors used in attacks affecting some Fortune 500 companies.By Michael Hill Aug 08, 2023 5 minsCloud SecurityNetwork SecurityOpen SourcenewsVectra AI unveils XDR platform with real-time attack signal intelligenceXDR platform uses native and third-party attack signals across hybrid cloud domains including AWS, Microsoft Azure, and Google Cloud as well as networks and endpoints.By Michael Hill Aug 08, 2023 4 minsThreat and Vulnerability ManagementCloud SecurityNetwork Securitynews analysisBeware of overly permissive Azure AD cross-tenant synchronization policiesA new proof of concept shows that attackers can use Azure AD CTS to leap to Microsoft and non-Microsoft application across tenants.By Lucian Constantin Aug 02, 2023 6 minsActive DirectoryAzure FunctionsCloud SecuritynewsCisco adds new ransomware recovery capabilities to XDR solutionFeatures reduce the time between the beginnings of a ransomware outbreak and capturing a snapshot of business-critical information to enhance business continuity.By Michael Hill Aug 01, 2023 3 minsRansomwareThreat and Vulnerability ManagementNetwork Securitynews analysisNew vulnerabilities mean it's time to review server BMC interfacesTwo recently discovered vulnerabilities in widely used baseboard management controllers could give remote and local threat actors full control over servers. By Lucian Constantin Jul 28, 2023 6 minsNetwork SecurityVulnerabilitiesnewsKyndryl enters MSSP market with new end-to-end security capabilitiesKyndryl’s new managed security services include managed detection and response (MDR) and security information and event management (SIEM).By Michael Hill Jul 27, 2023 4 minsManaged Service ProvidersSecurity Operations CenterNetwork SecuritynewsGovernments scramble to patch Ivanti Endpoint Manager Mobile security flawThe former MobileIron Core MDM system has a severe security flaw that could allow remote access, and all users are urged to patch their systems as soon as possible.By Jon Gold Jul 25, 2023 3 minsCyberattacksMobile SecurityNetwork Security Show more Show less View all Resources whitepaper How Security and User Experience Can Power Your Hybrid Workforce's Productivity As many as 77% of businesses have adopted permanent hybrid work policies, with the most popular scheduling model being hybrid-at-will, in which employees get to choose which days they work in the office. The post How Security and User Experience Can Power Your Hybrid Workforce’s Productivity appeared first on Whitepaper Repository. By Zscaler 16 Oct 2023Business OperationsDigital TransformationNetwork Security whitepaper How Security and User Experience Can Power Your Hybrid Workforce's Productivity By Zscaler 12 Oct 2023Business OperationsDigital TransformationNetwork Security whitepaper How Security and User Experience Can Power Your Hybrid Workforce's Productivity By Zscaler 12 Oct 2023Business OperationsDigital TransformationNetwork Security View all Podcasts podcastsSponsored by CiscoSecure Remote Working: what we've learnt and where we go from hereSecure Remote Working is a podcast series looking at how organizations have had to adapt during the COVID19 pandemic; the challenges they faced, the solutions they found, and the long-term impact of secure remote working at scale. This series outlines how the threat landscape changed, the cultural and leadership impacts, and the key technologies that have enabled organizations to continue to operate in difficult circumstances.3 episodesRemote Access Security Ep. 01 Episode 1: Preparing for the next phase in secure remote working Aug 10, 202032 mins Security Ep. 03 Episode 3: Guiding CISOs through change planning for the new way of working Aug 10, 202026 mins Security Video on demand videoWhat is zero trust security?Beyond firewalls and perimeter security, a zero trust architecture allows security officials to better protect data and system access to both outsider and insider threats, adopting a mantra of “trust no one”. We explain the concept in this video. Sep 06, 2023 3 minsAuthenticationZero TrustNetwork Security Get up to speed on SASE: What's driving demand and how providers' capabilities differ Oct 15, 2021 26 minsSASENetwork SecuritySecurity WAN evolution: From SD-WAN to Secure Access Service Edge (SASE) Jun 25, 2021 31 minsSASESD-WANNetwork Security How have network firewalls evolved? Apr 30, 2018 FirewallsNetwork MonitoringNetwork Security See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Okta confirms recent hack affected all customers within the affected system By Shweta Sharma Nov 30, 20233 mins Data BreachCyberattacksCybercrime news Top cybersecurity product news of the week By CSO staff Nov 30, 202317 mins Generative AISecurity feature How to maintain a solid cybersecurity posture during a natural disaster By James Careless Nov 30, 20238 mins Security Operations CenterData and Information SecuritySecurity Practices podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication Nov 06, 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome Oct 16, 202315 mins CSO and CISO