Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

7 Key Features That MSPs Need from a Cybersecurity Vendor

Customer trust is the biggest success indicator for MSPs. And yet, it’s only achieved with the right vendor partnerships. MSPs and MSSPs need to choose cybersecurity vendors with tailored and strategic portfolios that can cater to the emerging needs of each customer. Therefore, MSPs need a cybersecurity vendor that both understands this approach and delivers it to offer the greatest possible value. When vetting a cybersecurity vendor, MSPs should look for the following seven features.

6 proactive measures you can take to protect your data

Cybercrime is one of the biggest challenges that businesses face today. While many small and medium-sized businesses think they are unlikely targets as they are small in size, it is to be noted that any business whether big or small can be easy prey to cyber-attacks if it is not adequately prepared.

'One-Stop Shop' Functionality with Global Search

There are many critical factors to ensuring an effective cybersecurity program; however, two of the most important are accuracy and timeliness. With limited search capabilities that direct you to insufficient results or extended navigation time to find items of relevance, the cyber risk of your rapidly growing vendor ecosystem is left unmanaged. Think about it like this: when you have two contacts in your phone saved under the same first name, how do you determine which one is the right one to call?

How to Protect Your ATM Fleet from the Most Common ATM Crimes

Back in April, our team attended the ATMIA Canada Conference 2022, which focused on what is next for the industry, current trends in cash use, and ATM security. At one of the sessions, the ATM Security Association (ASA) presented their new Crisis & Crime Management Intelligence System – the industry’s first global-scale ATM crime database and intelligence management system for analysis of crime trends.

Securing Microsoft SQL Server

Microsoft SQL Server is a popular relational database management system created and maintained by Microsoft. It’s effective in numerous use cases: storage and retrieval of data as part of a DBMS, transaction processing and analytics applications. However, there are some essential measures you must take to protect your database from cybercriminals and security breaches, as the default security settings are relatively insufficient to keep your database safe.

What is the SANS Framework? The 6 Steps to Handling a Cyber Incident

A cyber incident can range from a minor power outage to a full-scale cyber attack. No matter the incident scale, having clear guidelines to follow can help organizations create effective and standardized response plans. The SysAdmin, Audit, Network, and Security (SANS) Institute is one of the leading organizations providing cybersecurity training, research, and certification.

Cisco Nexus Dashboard Vulnerabilities: CVE-2022-20857, CVE-2022-20858 and CVE-2022-20861

On Wednesday, July 20, 2022, Cisco disclosed a critical severity vulnerability – CVE-2022-20857 – impacting Cisco Nexus Dashboard, an integrated dashboard used for visibility and provisioning data center and cloud network infrastructure. If successfully exploited, the vulnerability could allow an unauthenticated, remote threat actor to execute arbitrary commands as the root user in any pod on a node.

Should You Buy an SSE Product From a CASB, SWG, or ZTNA Vendor? The Answer May Surprise You.

After the introduction of security service edge (SSE) with the February 2022 release of the Gartner Magic Quadrant for SSE, organizations may be wondering how they should choose an SSE vendor from the many profiled in the Gartner report. Interestingly enough during this year’s Gartner Security and Risk Management Summit in June 2022,