Can PAM Coexist with the Zero Trust Security Model? Yes says Thycotic
By Joseph Carson, Chief Security Scientist (CSS) & Advisory CISO at Thycotic
What is the Zero Trust security model and why was it introduced?
The concept of Zero Trust security isn’t new; the...
Microsoft Exposes 250 Million Customer Records: What to Do
January 1, 2020 – In Breaking News – CNN
Microsoft exposed nearly 250 million customer-service and customer-support records on the web for anyone to see.
Security researchers working with Comparitech discovered the unprotected data, which consisted...
Gurucul Webinar to Present Roadmap for Implementing a Zero Trust Model
Today’s cyber security professionals face the daunting task of securing a borderless perimeter where cyberattacks and insider threats are on the rise.
A truly secure organization cannot trust anything either inside or...
‘ASTORS’ Winner Gallagher & Convergint Enter Global Partnership
Gallagher, a global security technology manufacturer, and a New Platinum Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, along with Convergint Technologies, have entered into a partnership that will...
SolarWinds Launches SolarWinds Backup for Office 365
SolarWinds, a leading provider of powerful and affordable IT management software, and Multi-Award Winner for Four Consecutive Years in the Annual ‘ASTORS’ Homeland Security Awards Program, has launched SolarWinds® Backup for Office...
Konica Minolta Honored with Four 2019 ‘ASTORS’ Security Awards
Konica Minolta Business Solutions U.S.A., Inc., a Multiple-Award Winner in both the 2018 and 2017 'ASTORS' Awards Program, is pleased to announce that Konica Minolta has been awarded four new 2019...
New Orleans Declares State of Emergency After Cyber Attack (Video)
December 14, 2019 – In News – Forbes
The City of New Orleans has suffered a cybersecurity attack serious enough for Mayor LaToya Cantrell to declare a state of emergency.
The attack started...
5 Trends Will Dominate Cybersecurity in 2020, by Dr. Srinivas Mukkamala
Willy Sutton (an American bank robber listed on the FBI's Ten Most Wanted Fugitives list, who stole an estimated $2 million over the course of his forty-year robbery career,) famously said...
Brinqa Wins for Best Cyber Security Risk Mgmt Solution in 2019 ‘ASTORS’
The enterprise technology infrastructure has undergone significant changes in the last few years which has driven by the push for digital transformation; and the emergence and rapid adoption of new infrastructure technologies...
Secure Software Development: Challenges and Considerations
Guest OpEd by Gilad David Maayan
With advances in technology consumers are increasingly relying on applications and devices to perform daily tasks. These technologies have become essential to our lives and sometimes...