Tenable Named Vendor of the Year by Ingram Micro

Tenable Named Vendor of the Year by Ingram Micro

Tenable®, Inc., the Cyber Exposure company, today announced that it has been named Vendor of the Year by Ingram Micro Inc. The annual Ingram Micro Vendor of the Year awards celebrates the success of more than two dozen emerging and established-channel focused vendor organizations across several categories including technology, markets, and communities. The awards were presented virtually in October 2021 at Ingram Micro’s 2022 Marketing Experience Event. “As much of the workforce becomes increasingly distributed,…

Read More

McAfee Enterprise Continues to be a Leader in CASB and Cloud Security

McAfee Enterprise Continues to be a Leader in CASB and Cloud Security

Cloud Security Gateways (CSGs) are one of the hottest and most sought-after technologies in the market today, driven by the adoption of cloud services for business transformation and the acceptance of hybrid workforce policies. CSGs, also commonly known as Cloud Access Security Brokers (CASBs), are responsible for enforcing security policies to protect cloud-hosted corporate assets from advanced threats, while enabling seamless and secure access to these assets from any location and device.   We have witnessed an exponential…

Read More

Thankful for Hybrid Work at Cisco – Cisco Blogs

Thankful for Hybrid Work at Cisco – Cisco Blogs

“I can’t because of work.” How many times have you heard someone say that, or even worse, uttered that phrase yourself? I’m betting it’s been far too many times, and it is soul crushing when you miss out on something that has personal meaning to you “because of work”. At Cisco, it’s different. I’ve experienced a very different phenomenon in my 11 years at Cisco where I’m able to do all the things that have…

Read More

Now available: NASCIO 2021 State CIO Survey

Now available: NASCIO 2021 State CIO Survey

Digital acceleration is driving the agendas of State CIOs like never before. Recently, 49 state and territory CIOs provided their perspective on the current state of government IT and what they see on the horizon. Their thoughts, captured in the NASCIO 2021 State CIO Survey, reveals a shift in momentum as states transition to new technologies and strategies to improve citizen experiences, mitigate risk, and provide more inclusive broadband access. A strategic move to the…

Read More

Hackers Use ProxyLogon and ProxyShell Bugs in Phishing Blitz

Hackers Use ProxyLogon and ProxyShell Bugs in Phishing Blitz

Security researchers have warned attackers are abusing months-old Microsoft Exchange Server flaws to send convincing malware-laden phishing emails within organizations. A team at Trend Micro spotted the campaign, which exploits the ProxyLogon and ProxyShell vulnerabilities patched by Microsoft in March and May respectively. By doing so, attackers are able to compromise a victim organization’s on-premises Exchange server, and then send phishing emails to other inboxes in the same organization — disguised as legitimate replies to existing…

Read More

SEC Warning as Phishing Attacks Mount Online and By Phone

SEC Warning as Phishing Attacks Mount Online and By Phone

The Securities and Exchange Commission (SEC) has warned of a new multi-channel phishing campaign designed to elicit personal and financial information from victims. An investor alert from the regulator revealed that several people have come forward claiming to have received phone calls or voicemail messages from purported SEC staff. The scammers apparently raised concerns about suspicious activity on the recipients’ checking or cryptocurrency accounts in a bid to trick them into handing over more sensitive info —…

Read More

Wind Turbine Giant Offline After Cyber Incident

Wind Turbine Giant Offline After Cyber Incident

The world’s largest manufacturer of wind turbines was forced to shut down IT systems across several locations over the weekend after a cybersecurity incident. In a brief notice on Saturday, Vestas Wind Systems claimed the attack struck the day before, with IT services in multiple business units affected. At the time, the Danish firm said that customers, employees and other stakeholders could be affected by the incident, and that it was working with internal and…

Read More

Zero Care About Zero Days

Zero Care About Zero Days

The time to repurpose vulnerabilities into working exploits will be measured in hours and there’s nothing you can do about it… except patch By Fred House 2021 is already being touted as one of the worst years on record with respect to the volume of zero-day vulnerabilities exploited in the wild. Some cite this as evidence of better detection by the industry while others credit improved disclosure by victims. Others will simply conclude that as…

Read More

Product spotlight on identity management solutions

Product spotlight on identity management solutions

Product spotlight on identity management solutions | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Why network-based zero trust doesn’t protect your most valuable assets

Why network-based zero trust doesn’t protect your most valuable assets

Why network-based zero trust doesn’t protect your most valuable assets | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 3,268 3,269 3,270 3,271 3,272 3,902