Joseph Carson Thycotic

Can PAM Coexist with the Zero Trust Security Model? Yes says Thycotic

By Joseph Carson, Chief Security Scientist (CSS) & Advisory CISO at Thycotic What is the Zero Trust security model and why was it introduced? The concept of Zero Trust security isn’t new; the...

Microsoft Exposes 250 Million Customer Records: What to Do

January 1, 2020 – In Breaking News – CNN Microsoft exposed nearly 250 million customer-service and customer-support records on the web for anyone to see. Security researchers working with Comparitech discovered the unprotected data, which consisted...
Gurucul, a leader in behavior based security and fraud analytics technology, and a 2019, 2018 and 2016 'ASTORS' Award Winner, will host a webinar featuring Forrester on how to implement a Zero Trust security architecture using security analytics to automate risk assessment and policy enforcement.

Gurucul Webinar to Present Roadmap for Implementing a Zero Trust Model

Today’s cyber security professionals face the daunting task of securing a borderless perimeter where cyberattacks and insider threats are on the rise. A truly secure organization cannot trust anything either inside or...
New Winner in the the Annual 'ASTORS' Awards Program, Gallagher Security offers comprehensive security and business risk management solutions for large and small organizations throughout the world, addressing key issues of security and risk management.

‘ASTORS’ Winner Gallagher & Convergint Enter Global Partnership

Gallagher, a global security technology manufacturer, and a New Platinum Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, along with Convergint Technologies, have entered into a partnership that will...

SolarWinds Launches SolarWinds Backup for Office 365

SolarWinds, a leading provider of powerful and affordable IT management software, and Multi-Award Winner for Four Consecutive Years in the Annual ‘ASTORS’ Homeland Security Awards Program, has launched SolarWinds® Backup for Office...
How can you make sure your corporate data and valuable company information is safe and protected against data theft? Today’s MFPs (multifunctional peripherals) offer a huge range of functions and choices – which unfortunately goes along with a similarly wide range of potential security loopholes. Konica Minolta’s answer to this is the reliable protection of bizhub SECURE: together with you, we determine which of our industry-leading security standards are right for you. With this set of security measures, we give your Konica Minolta bizhub MFP and especially its HDD an extra level of protection to ensure that your data is more than secure – it’s bizhub SECURE!

Konica Minolta Honored with Four 2019 ‘ASTORS’ Security Awards

Konica Minolta Business Solutions U.S.A., Inc., a Multiple-Award Winner in both the 2018 and 2017 'ASTORS' Awards Program, is pleased to announce that Konica Minolta has been awarded four new 2019...
Ransomware is one of five major trends predicted to dominate cyber security next year, some are threat oriented while others are inward looking and focus on defensive measures.

5 Trends Will Dominate Cybersecurity in 2020, by Dr. Srinivas Mukkamala

Willy Sutton (an American bank robber listed on the FBI's Ten Most Wanted Fugitives list, who stole an estimated $2 million over the course of his forty-year robbery career,) famously said...
Brinqa Cyber Risk Services were built for security; transforming security, context and threat data into knowledge-driven insights that empower organizations to own their cyber risk.

Brinqa Wins for Best Cyber Security Risk Mgmt Solution in 2019 ‘ASTORS’

The enterprise technology infrastructure has undergone significant changes in the last few years which has driven by the push for digital transformation; and the emergence and rapid adoption of new infrastructure technologies...

Secure Software Development: Challenges and Considerations

Guest OpEd by Gilad David Maayan With advances in technology consumers are increasingly relying on applications and devices to perform daily tasks. These technologies have become essential to our lives and sometimes...
The ranking system used to determine the top 25 most dangerous software errors was based on a formula that accounted for prevalence and severity. Weaknesses that are both common and can cause significant harm received a high score, while issues that are rarely exploited or have a low impact were filtered out. (Courtesy of DHS S&T)

Top 25 Most Dangerous CWE Software Errors, DHS S&T and Mitre

From smartphone games and personal email accounts to international banking and hospital records, software is everywhere, entertaining, boosting efficiency, and even saving lives. Unfortunately, for every new program developed, there is likely...