Joseph Carson Thycotic

Can PAM Coexist with the Zero Trust Security Model? Yes says Thycotic

By Joseph Carson, Chief Security Scientist (CSS) & Advisory CISO at Thycotic What is the Zero Trust security model and why was it introduced? The concept of Zero Trust security isn’t new; the...

Microsoft Exposes 250 Million Customer Records: What to Do

January 1, 2020 – In Breaking News – CNN Microsoft exposed nearly 250 million customer-service and customer-support records on the web for anyone to see. Security researchers working with Comparitech discovered the unprotected data, which consisted...
New Winner in the the Annual 'ASTORS' Awards Program, Gallagher Security offers comprehensive security and business risk management solutions for large and small organizations throughout the world, addressing key issues of security and risk management.

‘ASTORS’ Winner Gallagher & Convergint Enter Global Partnership

Gallagher, a global security technology manufacturer, and a New Platinum Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, along with Convergint Technologies, have entered into a partnership that will...
How can you make sure your corporate data and valuable company information is safe and protected against data theft? Today’s MFPs (multifunctional peripherals) offer a huge range of functions and choices – which unfortunately goes along with a similarly wide range of potential security loopholes. Konica Minolta’s answer to this is the reliable protection of bizhub SECURE: together with you, we determine which of our industry-leading security standards are right for you. With this set of security measures, we give your Konica Minolta bizhub MFP and especially its HDD an extra level of protection to ensure that your data is more than secure – it’s bizhub SECURE!

Konica Minolta Honored with Four 2019 ‘ASTORS’ Security Awards

Konica Minolta Business Solutions U.S.A., Inc., a Multiple-Award Winner in both the 2018 and 2017 'ASTORS' Awards Program, is pleased to announce that Konica Minolta has been awarded four new 2019...
On October 2, the FBI issued a high-impact cyber-attack warning in response to attacks on state and local government targets. This warned that health care organizations, industrial companies, and the transportation sector were also being targeted.

New Orleans Declares State of Emergency After Cyber Attack (Video)

December 14, 2019 – In News – Forbes The City of New Orleans has suffered a cybersecurity attack serious enough for Mayor LaToya Cantrell to declare a state of emergency. The attack started...
Ransomware is one of five major trends predicted to dominate cyber security next year, some are threat oriented while others are inward looking and focus on defensive measures.

5 Trends Will Dominate Cybersecurity in 2020, by Dr. Srinivas Mukkamala

Willy Sutton (an American bank robber listed on the FBI's Ten Most Wanted Fugitives list, who stole an estimated $2 million over the course of his forty-year robbery career,) famously said...
Brinqa Cyber Risk Services were built for security; transforming security, context and threat data into knowledge-driven insights that empower organizations to own their cyber risk.

Brinqa Wins for Best Cyber Security Risk Mgmt Solution in 2019 ‘ASTORS’

The enterprise technology infrastructure has undergone significant changes in the last few years which has driven by the push for digital transformation; and the emergence and rapid adoption of new infrastructure technologies...
The ranking system used to determine the top 25 most dangerous software errors was based on a formula that accounted for prevalence and severity. Weaknesses that are both common and can cause significant harm received a high score, while issues that are rarely exploited or have a low impact were filtered out. (Courtesy of DHS S&T)

Top 25 Most Dangerous CWE Software Errors, DHS S&T and Mitre

From smartphone games and personal email accounts to international banking and hospital records, software is everywhere, entertaining, boosting efficiency, and even saving lives. Unfortunately, for every new program developed, there is likely...
Over the past few years, Yubico has worked with Microsoft to help drive the future of passwordless authentication through the creation of the FIDO2 and WebAuthn open authentication standards.

‘ASTORS’ Finalist Yubico Reveals First Biometric YubiKey (See in Action)

Yubico, a Gold Award Winner in the 2018 ‘ASTORS’ Homeland Security Awards Program, and a Finalist in the 2019 ‘ASTORS’ Homeland Security Awards Program, is excited to announce the long-awaited YubiKey Bio. It...
Implementing SecOps can be challenging, as it often requires not only a change in processes but also in how IT operations teams think.

4 SecOps Challenges and How to Overcome Them

Guest OpEd by Gilad David Maayan The competitive software market has created a paradox of conflicting demands. On the one hand, consumers have come to expect ever-faster software delivery, and this includes...