Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

May 2022

How to Enable Two-Factor Authentication (2FA) in the CurrentWare Suite | CurrentWare v7.0.1 Tutorial

This video will teach you how to set up two-factor authentication (2FA) in CurrentWare version 7.0.1. Two-factor authentication provides an extra layer of security if anyone other than you attempts to log in to your CurrentWare web console using your account.

Two-Factor Authentication, App Productivity & Admin Logs (v7.0.1)

CurrentWare version 7.0.1 is here! With this release we’re excited to announce the introduction of two key security features: Two-factor authentication (2FA) and our first two admin activity logs! These enhancements provide an extra layer of security to help ensure that only trusted operators are accessing your admin console while providing greater visibility into what they are doing within the CurrentWare Suite.

How to Stop Insider Threats With UEBA

As the digital transformation continues at full speed, the majority of humanity's routine activities have begun to be carried out through digital channels. As the world digitizes, the potential loot in the lap of hackers grows. That's why we witness the development of new cyber threats every day. This requires all organizations, from the smallest to the largest, to be prepared for advanced cyber attacks.

Ekran System Provides New Report Customization Opportunities for Microsoft Power BI Users

Ekran System is glad to announce new capabilities for integrating with Microsoft Power BI that will help you simplify data processing and visualization. Since the majority of our customers use Microsoft Power BI to visualize data, optimizing the Ekran System API for working with this tool was a top priority for us. Now, you can easily and quickly export your monitoring data from Ekran System directly to a report template of your choice in Power BI.

How to Migrate Your Legacy CurrentWare Software to the New Web Console (2022 Tutorial) | CurrentWare

In this video you will learn how to easily upgrade from the legacy desktop version of the CurrentWare Suite to the new web console. By upgrading to the web console you'll gain access to a variety of new capabilities.

Shell Evasion: An Insider Threat

Cybersecurity strategies within cloud environments are often seen as a complicated landscape with rapidly developing technologies, architectures, and terms. Simultaneously, there are continuously motivated individuals and groups trying to utilize vulnerabilities for illicit uses such as to increase access to the data, install malware, disrupt services, and more.

From Behavior Analytics to Security Education: 4 Ways Organizations Should Mitigate Modern Insider Attacks

While the stakes for private sector organizations differ drastically from governments that have to protect state secrets like hacking tools or nuclear technologies, businesses do have their own needs for Data Loss Prevention measures. Organizations can face the threat of data like their intellectual property (IP), source code, customer details, Personally Identifiable Information (PII), financial info, and many other types of information being stolen or corrupted.

Are Your Employees Creating Risks For Your Organization While Working at Home?

This is the important question that Veriato Head of Product & Technology, Jay Godse asks in his new article, published this week. With so many employees working from home, it’s hard for CISOs, managers and HR leaders to know what they are doing, and that creates risk. Don’t wait until it’s too late. Threats to the company are much harder to spot when people are working at home.