What We Are Reading
Article Cybersecurity

The Foundations of DHS CDM: Vulnerability Management

Explore the key practices of vulnerability management — a key component of Phase 1 of the DHS CDM Program — and learn how your agency can benefit from it.

Article Cybersecurity

Work from Anywhere Doesn't Work Without Endpoint Security

Cybercriminals are targeting the work from anywhere workforce, which coupled with the increasingly sophisticated threat landscape underscores exactly how important endpoint security is for organizations.

Article Cybersecurity

How to mitigate the Microsoft Office zero-day attack

Follow this advice to block malicious Office files from doing harm to your network even if you've implemented Microsoft's recommended actions.

Article Cybersecurity

How to mitigate the Microsoft MSHTML remote code execution zero-day

A new zero-day vulnerability allows attackers to gain network access through Microsoft 365 documents. Here’s how to stop it.

Article Cybersecurity

5 observations about XDR

The technology is evolving, so security professionals and pundits must be open-minded and closely track market developments.

Article Cybersecurity

How SMBs should select a security-savvy managed service provider

SMBs typically outsource some or all their IT services to an MSP. Here’s how to find one that takes security seriously.

Blogs
Blog Cybersecurity

Cloud Based Firewall -- Is It Right for Your Network Security?

Cloud-based firewalls are cloud-deployed “virtual” network devices. Recently emerging as a new software-based technology, cloud firewalls are built to fulfil the same purpose, namely the prevention of unauthorized access to…

Blog Cybersecurity

Importance of Security Operations Centre in Cyber Security

Cyber security threats are becoming more and more challenging to detect and mitigate and even more common and dangerous in their types. According to a research study on the Cost…