Key Considerations for the DoE on Defending the Bulk Power Grid

Key Considerations for the DoE on Defending the Bulk Power Grid

On January 20, President Joseph Biden issued Executive Order (E.O.) 13990 to help protect U.S. bulk power organizations. This Order enacted a 90-day suspension of E.O. 13920 which was set by the previous administration. The new executive order empowered the Secretary of Energy (“Secretary”) to publish new criteria around pre-qualifying vendors of electric equipment, as well as to devise rules for helping U.S. entities replace electric devices at risk of sabotage. With those functions suspended,…

Read More

Tenable.io Named Best Vulnerability Management Solution at SC Awards Europe 2021

Tenable.io Named Best Vulnerability Management Solution at SC Awards Europe 2021

Tenable®, Inc., the Cyber Exposure company, announced Tenable.io® was named the winner of the SC Awards Europe Best Vulnerability Management Solution category. The enterprise is rapidly evolving as organisations embrace digital transformation. Against this expanded attack surface, organisations struggle with vulnerability overload and the inability to identify today’s most business-critical issues before they become tomorrow’s compromises. Tenable.io was designed to address this challenge. Powered by Nessus technology and managed in the cloud, it automatically detects…

Read More

Proofpoint Announces Expiration of “Go-Shop” Period | Proofpoint US

Proofpoint Announces Expiration of “Go-Shop” Period | Proofpoint US

Transaction Is Expected to Close in Third Quarter of 2021 Proofpoint, Inc. (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced the expiration of the 45-day “go-shop” period under the terms of the previously announced definitive agreement, pursuant to which Thoma Bravo, a leading private equity investment firm focused on the software and technology-enabled services sector, will acquire Proofpoint in an all-cash transaction that values Proofpoint at approximately $12.3 billion. The “go-shop” period expired…

Read More

Tenable Partners with CyberNB to Secure Canada’s Critical Infrastructure

Tenable Partners with CyberNB to Secure Canada’s Critical Infrastructure

Tenable®, Inc., the Cyber Exposure company, today announced it has become the first vulnerability management vendor to partner with CyberNB’s Critical Infrastructure Security Operations Center (CI-SOC) to increase the resilience and security of Canada’s critical infrastructure. Through the strategic partnership, Tenable will bring its risk-based vulnerability management and industrial security solutions to the CI-SOC, empowering critical infrastructure stakeholders to see, predict and reduce cybersecurity risk.  CI-SOC brings together data from multiple critical infrastructure owners and…

Read More

Zero Trust, a core component of any modern security strategy

Zero Trust, a core component of any modern security strategy

Zero Trust, a core component of any modern security strategy | 2021-06-10 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

The buyer’s dilemma: Insights and tips on finding the right cybersecurity vendor

The buyer’s dilemma: Insights and tips on finding the right cybersecurity vendor

The buyer’s dilemma: Insights and tips on finding the right cybersecurity vendor | 2021-06-10 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

Rethinking Remote Monitoring and Management: How MSPs Can Put Security First and Better Protect Their Clients

Rethinking Remote Monitoring and Management: How MSPs Can Put Security First and Better Protect Their Clients

By Ryan Heidorn, Managing Partner, Steel Root For most Managed Service Providers (MSPs), using a remote monitoring and management (RMM) platform to centrally manage their clients’ networks is a foregone conclusion – it’s generally assumed that RMM tools are necessary to deliver IT services. However, that tide may be turning as more MSPs wake up to the fact that traditional RMM platforms can introduce an increasingly unacceptable level of risk to their business and their…

Read More

Key Business Lessons Learned from The SolarWinds Hack

Key Business Lessons Learned from The SolarWinds Hack

By, George Waller, CEO of Strikeforce Technologies A full year of disruption by the global pandemic has forced businesses to adapt fast to the shifting remote work realities. This new dynamic, which has employees using their own computers and accessing company networks everywhere but the office, has created new headaches and threat vectors for security and IT professionals. There’s been a massive increase in global cyber attacks aimed at governments and corporations since the very…

Read More

5 Tips and Tricks for Improving Cloud Native Security

5 Tips and Tricks for Improving Cloud Native Security

Cloud-native applications that are based on new types of infrastructure such as containers and serverless platforms are being rapidly adopted by organizations worldwide. While cloud-native applications deliver compelling benefits such as elastic scalability, unmatched resilience and rapid development velocity, they also raise challenges. Cloud-native applications have a huge number of moving parts and are based on short-lived infrastructure elements that are here one minute and gone the next. This raises operational and maintenance challenges, but…

Read More

Siloscape, first known malware that drops a backdoor into Kubernetes clusters

Siloscape, first known malware that drops a backdoor into Kubernetes clusters

Siloscape is a new strain of malware that targets Windows Server containers to execute code on the underlying node and spread in the Kubernetes cluster. Researchers from Palo Alto Networks have spotted a piece of malware that targets Windows Server containers to execute code on the underlying node and then drop a backdoor into Kubernetes clusters. Siloscape is a heavily obfuscated malware that was designed to open a backdoor into poorly configured Kubernetes clusters in order…

Read More
1 3,328 3,329 3,330 3,331 3,332 3,584