-
Expert guidance abounds for enterprises to protect themselves against ransomware, phishing and other cyberattacks, but sometimes that advice is more effective when dispensed with real-world examples for specific scenarios.
-
Rubrik says it's brining cyber posture and cyber recovery to provide Microsoft Azure Blob Storage customers further visibility into their cloud data, enabling business agility and resilience.
-
Aim is to help organizations modernize their VMs and applications while enhancing cyber resilience, offering features like easier migration, faster data recovery, and unified data management across virtualized environments to help better protect against evolving threats.
-
Data resilience specialist Veeam Software updated its Data Cloud Vault with two new pricing tiers and enhanced integration with the Veeam Data Platform.
-
Data security specialist Druva announced extended support in Microsoft environments, specifically Microsoft 365 Dynamics Sales and Customer Service CRM modules.
-
Straight from the front lines of cyber defense, time-poor, one-person Security Operations Center operator Paul Schnackenburg dives into Microsoft Defender XDR and Sentinel's SOC Optimization feature, highlighting how it helps streamline security coverage while managing costs.
-
Cloud giants Microsoft and Google, along with many other major industry players, are backing a new identity security standard proposed by Okta and the OpenID Foundation.
-
A bevy of recent cybersecurity reports point to the continuing problem of nation-state-sponsored threat actors, though Microsoft seems more alarmed about the issue, leading the calls for action on the part of industry and government.
-
Our practicing cybersecurity expert in Australia looks at the different types of MFA and how you can use them in a Microsoft context, dives deep into "in the middle" schemes and relates a successful client breach, though "we dodged a bullet."
-
Partnership will provide critical user context to accelerate threat detection and response.
-
SD-WAN was one of the hottest parts of IT networking not too long ago, and while it has lost lustre among other industry technologies since its heyday, the market is being reinvigorated by advanced Generative AI and machine learning (ML) developments.
-
Advanced AI can defeat CAPTCHAs designed to prove web actions are being performed by humans instead of machines, so a better security mechanism is needed for the internet, new research indicates.
-
"Ransomware is that ultimate punch in the mouth," says cybersecurity expert Allan Liska in recounting the familiar quote from champion boxer Mike Tyson, who once opined that when coming into the ring every opponent has a plan until they get punched in the mouth. To prepare for that punch, the "Ransomware Sommelier" has a checklist.
-
"Our latest collaboration with CrowdStrike allows customers to bring their own (BYO) cyber threat intelligence."
-
This proposed rule from the department's Bureau of Industry and Security aims to enhance national security by establishing reporting requirements for the development of advanced AI models and computing clusters.
-
By Tom Fenton
Veteran attendee Tom Fenton explains how the event showcased a clear vision for VMware's future, with AI, on-premises and edge computing emerging as focus points.
-
Security groups crucially keep VM instances secure, so cloud expert Brien Posey is sharing best practices for working with them.
-
"I'm an MSP, providing IT services to a handful of small businesses, and the software supply chain brings a lot of risks to my clients."
-
"Continuous verification of identities and permissions, coupled with designing systems that limit the potential impact of issues, is crucial."
-
A new tool called the IAM Access Analyzer can help you to find IAM resources with unused permissions, IAM settings that allow for external access, and more.
-
Adversarial testing with red/black teams is nothing new in cybersecurity, but a new paper examines how advanced AI can help and provides recommendations for organizations to do just that.
-
The top cybersecurity threat in the cloudscape has changed from a couple years ago says a new report from the Cloud Security Alliance (CSA), which provided handy mitigation strategies and suggested AI can help (or hurt).
-
Longtime IT trainer Paul Schnackenburg explains why it's time we started managing CA policies seriously, checking them against best practices regularly with Maester, backing them up and documenting them.
-
It's commonly accepted that AI will outperform humans and replace many IT positions, but a new survey of CISOs by Bugcrowd indicates AI is already beating security pros in some areas and is expected to take on a larger role in the future.
-
Even with all the technology bells and whistles and alerts and services and multi-factor authentication and social engineering training and enterprise-wide integrated cybersecurity platforms -- and articles like this -- the human factor is still one of the biggest threats to cloud security.