Many enterprises still rely on Microsoft Windows Server 2008 to run business critical applications. But Windows Server 2008 will reach End of Support on January 14, 2020, which means no more security and maintenance patches. Every enterprise has to face down this issue of legacy systems sooner or later. With Windows...
This survey report reveals that for many organizations, threat hunting is still new and poorly defined from a process and organizational standpoint. Most are still reacting to alerts and incidents instead of proactively seeking out the threats.
While the act of threat hunting cannot be fully automated, it heavily...
Warning: Attackers behind the recently revealed Facebook mega-breach may still be able to access victims' accounts at some third-party web services and mobile apps, and Facebook has offered no timeline for when a full lockdown might occur - although there are no signs of third-party account takeovers.
Step away from the social media single sign-on services, cybersecurity experts say, citing numerous privacy and security risks. Instead, they recommend that everyone use password managers to create unique and complex passwords for every site, service or app they use.
While Facebook has invalidated 90 million users' single sign-on access tokens following a mega-breach, researchers warn that most access token hijacking victims still lack any reliable "single sign-off" capabilities that will revoke attackers' access to hyper-connected web services and mobile apps.
Endpoint management, while broad from a technology standpoint, is moving in a definitive direction - the ability to centrally discover, provision, deploy, update, and troubleshoot endpoint devices within
an organization. The proliferation of laptops, desktops, and more will propel the worldwide market for
The workplace is transforming, and keeping up with evolving security
threats has become more critical and challenging than ever. Malware
attacks come from all directions and according to IDC, 70 percent of
successful breaches begin at the endpoint.1 This means that having a
comprehensive endpoint management...
The Food and Drug Administration plans to launch a new digital health "center of excellence" that includes a cybersecurity unit. The new unit would not only deal with cyber issues pertaining to new health technologies, but also challenges facing older medical devices.
Most enterprises are at least discussing security
analytics. But how are they actually deploying these
tools? And with what levels of automation and
Download this e-book to learn more about:
How security analytics is commonly used today;
The potential of automation;
How orchestration impacts...
With 90% of organizations expected to have hybrid cloud infrastructure by 2020, the migration to the cloud is here to stay. Yet the reality is that digital environments can be a security blind spot for many organizations who struggle with the limited visibility and control, especially as their existing security tools...
It may seem silly to wonder how safe your backups are; backups are rarely
thought of as being at risk. It stems back to a time when backups were on
tape - a medium that would be tough for even skilled developers to hack. But
today's backups are stored (whether on-premises or in the cloud) on disk or,
If you are reading this, it means you are taking time out of your busy schedule to search for data protection solutions. Data protection is not meant to be exciting; it's meant to automate the boring parts through automation so that your company stays out of the negative headlines.
"You get paid for...
Modern backup is still too complicated. Adding to the woes of the modern backup administrator
is the fact that very few organizations get to tear
their entire IT apparatus down and take a completely
modern, greenfield approach. In the real world, data
centers are the result of incremental growth. With that growth...
Although the terms "backup" and "archiving" are sometimes used
interchangeably, they refer to two completely different processes. Both deal
with long-term data storage, yes, but that is where the similarities end.
Backups are designed to provide an organization with a way of recovering its
data following some sort...