April 23, 2021 | Kyle Chrzanowski

Lessons learned from building an inventory of systems

IT asset inventory vs an ISI – What’s the difference?  Many frameworks, standards, and regulations require organizations to have an IT Asset Management program in place. However, the understanding of what separates a mature Information System Inventory (ISI) from an IT Asset Inventory and the benefits realized from an ISI are generally less well understood. Naturally this…

April 21, 2021 | Karoline Gore

Bridging the Cybersecurity frontier: SaaS

This blog was written by an independent guest blogger. Software as a service (SaaS) is one of the most important parts of the modern digital business. Unfortunately, when it comes to cybercrime, it can also be one of the weakest. The Cybersecurity newsletter, The Hacker News, have highlighted this in detail, noting interest from across the digital industry in…

Get the latest security news in your inbox.

Subscribe via email

RSS

April 20, 2021 | Rupesh Chokshi

Best practices for businesses to stay safe online this tax season

It’s tax time again. Typically, the deadline for federal tax filing in the United States is April 15, but this year the deadline has been extended to May 17, 2021. However, if you think your business will be receiving a refund, the IRS encourages you to file as early as possible. Filing taxes can be stressful. Adding to the potential stress…

April 19, 2021 | Rakesh Shah

Introducing AT&T’s Managed Endpoint Security with SentinelOne

With 5G, edge solutions, and digital transformation all around us, every enterprise should be taking a closer look at their endpoint security and evaluate options that will be able to keep pace with this dynamic new environment.The newly introduced  AT&T Managed Endpoint Security with SentinelOne™ offer brings world class managed services with comprehensive…

April 19, 2021 | Bindu Sundaresan

Digital transformation moves application security to the top of mind list!

Here are some insights from AVP, Cybersecurity Todd Waskelis as we discussed cybersecurity and application security in focus. How has COVID changed the game for application security? Shift Left, Shift Right, and Shift everywhere? 2020 had several significant events around application security, including the move of applications to the cloud, the expansion of remote workers using cloud accessed applications,…

April 16, 2021 | Carnell Council

Considerations for performing IoMT Risk Assessments

What are Internet of Medical Things (IoMT) products? Internet of Medical Things (IoMT) products refer to a combination of medical applications and devices connected to healthcare information technology systems through an online computer network or a wireless network. IoMT devices rely heavily on biosensors, critical in detecting an individual's tissue, respiratory, and blood characteristics. Non-bio sensors are also used…

April 15, 2021 | Dax Morrow

The rise of QakBot

This blog was jointly written with Ofer Caspi. Some of the links in this blog require an OTX account, and the QakBot infrastructure tracker will require readers to be customers with access to the Threat Intel subscription.. Thanks to the following researchers and the MalwareBazaar Project: @0verfl0w_   @_alex_il_   @malware_traffic   @lazyactivist192 …

April 14, 2021 | Bob Covello

Phishing towards failed trust

This blog was written by an independent guest blogger. Phishing exercises are an important tool towards promoting security awareness in an organization.  Phishing is effective, simply because it works.  However, any social engineer can devise a marvelously deceptive message with an irresistible link that only the most tech-savvy person would spot as a phishing test.  Sometimes, the…

April 13, 2021 | Ziv Hagbi

Advanced mobile protection through the AlienApp for MobileIron

Companies of all sizes need clear and cohesive security visibility over every aspect of their organization. As data and assets are trending to mobile, it’s critical to be equipped with the right tools to gain insights on mobile devices and users on the endpoints and mitigate threats whenever needed. Collecting threat data from mobile devices and discovering mobile…

April 9, 2021 | Mark Stone

What is a cybersecurity strategy and how can your business develop one?

This article was written by an independent guest author The number of users, devices, and resources on company networks is growing exponentially. With this expanding attack surface, a company’s assets, intellectual property, reputation, staff and customer data are all at risk. It’s no wonder cybersecurity has increased in prominence, with many organizations investing in more sophisticated…

April 9, 2021 | Derrick Johnson

The difference between SASE and Zero Trust

Customers often ask me: What is the difference between Zero Trust and SASE?  My answer is almost always the same: Nothing….and, everything.  Both have taken the industry by storm over the last couple of years, and even more so with the security and access demands on the business driven by the existing remote workforce, but both…

April 7, 2021 | Tawnya Lancaster

Do customers really care about SASE? Absolutely, and here’s why

As IT and security leaders adapt to business operations in the “new normal,” they are simultaneously being charged with priming the business to win in the next era of distributed computing. This involves myriad updates to the business’ IT systems, and in some cases, a comprehensive overhaul for network modernization, cloud migration, and edge design and deployment …