Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Remote Work Security: Trusting Employees and Protecting Data

With the rise of remote work, ensuring that employees are actually working from secure locations is more crucial than ever. This clip discusses the trust issues and risks associated with employees working from unapproved locations, highlighting the need for robust IT asset management and security protocols to protect sensitive data.

Understanding the Difference Between BDRSuite and BDRCloud

When it comes to backup and disaster recovery, Vembu offers two robust solutions: BDRSuite and BDRCloud. While both are designed to deliver comprehensive protection for your data, they cater for different deployment preferences. BDRSuite and BDRCloud are cost-effective and comprehensive backup and disaster recovery solution offering.

Windows 11 Boosts Security: NTLM Out, Kerberos In

Microsoft’s initiative to phase out NTLM authentication in favor of the more secure Kerberos protocol was originally announced back in October 2023. At that time, the Windows maker declared its intention to deprecate NTLM and encourage organizations to transition to Kerberos for authentication purposes across its ecosystem. Microsoft announced this week that later this year they are expecting to retire NTLM authentication in Windows 11.

Friday Flows Episode 26: Use AI to Summarize CISA Alerts

In this Friday Flows, Kevin Davis walks through a new story incorporating CISA’s catalog of known exploited vulnerabilities, filters them to identify the most critical ones, and then prioritizes and offers a concise summary for each vulnerability… using our new AI features! There are two main ways Tines has incorporated AI into workflow building: 1) "Automatic Mode" in our Event Transform action and 2) a new AI action.

Memcyco Presents: The State of Digital Impersonation Fraud Resilience

Ever had those sleepless nights, tossing and turning, worrying about your next health checkup? Well, in the cyber world, it’s your brand that’s losing sleep! We recently talked to 200 top-notch security and fraud professionals—think of them as the cardiologists of the cybersecurity world. They spilled the beans on how digital impersonation attacks mess with their brand’s health.

The Hidden Dangers of Unapproved Tech: A Cautionary Tale

In today's digital age, the allure of cutting-edge technology is undeniable. However, the rush to adopt the latest gadgets can sometimes lead us into murky waters, especially when these devices lack official approval. In this eye-opening video, we delve into a real-world scenario where internet-connected watches, without proper authorization, communicated with unauthorized external servers.

What To Do if You've Been Scammed

If you’ve been scammed, there are different actions you should take based on what you were scammed into doing. For example, if you accidentally paid a scammer, you should contact your bank immediately. If you gave a scammer your login credentials, you should update your passwords and enable MFA immediately. If a scammer hacked your device, you should run antivirus software and possibly factory reset your device.

Keeper Refreshes Browser Extension for Increased Usability

Keeper Security is excited to announce an updated User Interface (UI) for its browser extension across all supported browsers. The refreshed UI features a modernized design, and simplifies the process of finding and creating records for users. The new browser extension updates continue the recent UI enhancements to Keeper’s end-user vault and Admin Console.

Keeper Secures Repeat Win in CHIP Password Manager Test

Keeper Security has once again clinched the prestigious title of “Test Winner” in a group test of leading password managers conducted by CHIP Magazine, a renowned consumer technology publication in Germany. This marks the second consecutive year Keeper has secured this esteemed recognition, following its victory in the 2023 review.