April 19, 2021 | Bindu Sundaresan

Digital transformation moves application security to the top of mind list!

Here are some insights from AVP, Cybersecurity Todd Waskelis as we discussed cybersecurity and application security in focus. How has COVID changed the game for application security? Shift Left, Shift Right, and Shift everywhere? 2020 had several significant events around application security, including the move of applications to the cloud, the expansion of remote workers using cloud accessed applications,…

April 16, 2021 | Carnell Council

Considerations for performing IoMT Risk Assessments

What are Internet of Medical Things (IoMT) products? Internet of Medical Things (IoMT) products refer to a combination of medical applications and devices connected to healthcare information technology systems through an online computer network or a wireless network. IoMT devices rely heavily on biosensors, critical in detecting an individual's tissue, respiratory, and blood characteristics. Non-bio sensors are also used…

Get the latest security news in your inbox.

Subscribe via email

RSS

April 15, 2021 | Dax Morrow

The rise of QakBot

This blog was jointly written with Ofer Caspi. Some of the links in this blog require an OTX account, and the QakBot infrastructure tracker will require readers to be customers with access to the Threat Intel subscription.. Thanks to the following researchers and the MalwareBazaar Project: @0verfl0w_   @_alex_il_   @malware_traffic   @lazyactivist192 …

April 14, 2021 | Bob Covello

Phishing towards failed trust

This blog was written by an independent guest blogger. Phishing exercises are an important tool towards promoting security awareness in an organization.  Phishing is effective, simply because it works.  However, any social engineer can devise a marvelously deceptive message with an irresistible link that only the most tech-savvy person would spot as a phishing test.  Sometimes, the…

April 13, 2021 | Ziv Hagbi

Advanced mobile protection through the AlienApp for MobileIron

Companies of all sizes need clear and cohesive security visibility over every aspect of their organization. As data and assets are trending to mobile, it’s critical to be equipped with the right tools to gain insights on mobile devices and users on the endpoints and mitigate threats whenever needed. Collecting threat data from mobile devices and discovering mobile…

April 9, 2021 | Mark Stone

What is a cybersecurity strategy and how can your business develop one?

This article was written by an independent guest author The number of users, devices, and resources on company networks is growing exponentially. With this expanding attack surface, a company’s assets, intellectual property, reputation, staff and customer data are all at risk. It’s no wonder cybersecurity has increased in prominence, with many organizations investing in more sophisticated…

April 9, 2021 | Derrick Johnson

The difference between SASE and Zero Trust

Customers often ask me: What is the difference between Zero Trust and SASE?  My answer is almost always the same: Nothing….and, everything.  Both have taken the industry by storm over the last couple of years, and even more so with the security and access demands on the business driven by the existing remote workforce, but both…

April 7, 2021 | Tawnya Lancaster

Do customers really care about SASE? Absolutely, and here’s why

As IT and security leaders adapt to business operations in the “new normal,” they are simultaneously being charged with priming the business to win in the next era of distributed computing. This involves myriad updates to the business’ IT systems, and in some cases, a comprehensive overhaul for network modernization, cloud migration, and edge design and deployment …

April 6, 2021 | Irfan Shakeel

Use AI to fight AI-powered cyber-attacks

This blog was written by an independent guest blogger "AI is likely to be either the best or worst thing to happen to humanity.” ~Stephen Hawking Cyber-attacks are commonly viewed as one of the most severe risks to worldwide security. Cyber-attacks are not the same as they were five years back in aspects of availability and efficiency. Improved technology…

April 2, 2021 | Bernard Brode

5 steps to respond to a data breach

This blog was written by an independent guest blogger. You’ve just been breached. What do you do next? Depending on personality, preparation, and ability under crisis, there are a variety of responses to choose from, some effective and some not. Hopefully, you’re the rare breed who plans in advance how to respond. Even better if this…

April 1, 2021 | Lisa Ashjian

Endpoint Security: Helping to realize the benefits of SASE

Endpoint security is at the forefront of digital transformation due to the very nature of needing to protect devices outside the company’s network perimeter. This started with traditional devices such as laptops and desktops.  Endpoint security then quickly expanded to include mobile security, for smartphones and tablets. And, as more data moved to the cloud endpoint security…

March 30, 2021 | Nahla Davies

What educational institutions need to do to protect themselves from cyber threats

This blog was written by an independent guest blogger. Educational institutions are reaping the many benefits and new possibilities offered by online learning, but these new methods of educational instruction come with serious cyber security concerns. These institutions are also a prime focus for hackers because they often host a lot of sensitive data about teachers and students.  Furthermore,…