Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Supporting your remote workforce: Automatic cached credentials update

In today’s increasingly remote work environment, IT administrators face the challenge of ensuring end users can securely and seamlessly access company resources from anywhere. A critical aspect of this is managing passwords, particularly when users are away from the domain network. These remote users greatly benefit from cached credentials, or the domain username and password hash stored locally on users’ machines after a successful domain-connected login.
Featured Post

Data Resilience and Protection in the Ransomware Age

Data is the currency of every business today, but it is under significant threat. As companies rapidly collect and store data, it is driving a need to adopt multi-cloud solutions to store and protect it. At the same time, ransomware attacks are increasing in frequency and sophistication. This is supported by Rapid7's Ransomware Radar Report 2024 which states, "The first half of 2024 has witnessed a substantial evolution in the ransomware ecosystem, underscoring significant shifts in attack methodologies, victimology, and cybercriminal tactics."

CIO POV: Impactful AI Programs Start with 'Why'

Generative AI (GenAI) has the power to transform organizations from the inside out. Yet many organizations are struggling to prove the value of their GenAI investments after the initial push to deploy models. “At least 30% of GenAI projects will be abandoned after proof of concept by the end of 2025, due to poor data quality, inadequate risk controls, escalating costs or unclear business value,” according to Gartner, Inc.

Introducing Astra OrbitX: Continuous Security at Scale

Engineering Leaders are stretched thinner than ever, racing to deliver innovative products and scale operations while securing a complex digital ecosystem across the increasing perimeter of code, DevOps, compliance, and more. Remember the infamous MOVEit attacks that compromised nearly 2,000 organizations, from BBC and Harvard to local government agencies. Over 67 million individuals were affected, underscoring the devastating consequences of such breaches.

Keeper Announces New Updates Including Passphrase Generator for iOS and Android

Keeper Security is excited to announce that passphrases are now supported for mobile platforms on Android and coming soon for iOS, extending the same passphrase experience users have enjoyed in the Keeper Web Vault. In addition, Keeper’s latest update provides enhanced autofill capabilities for long-tap autofilling and Time-based One-Time Passwords (TOTP) on iOS.

CrowdStrike Announces Falcon Identity Protection Innovations for Entra ID and Privileged Access

In the critical and constantly evolving identity security space, organizations are focused on three essential needs: While identity security disciplines like identity security posture management (ISPM), identity threat detection and response (ITDR) and privileged access management (PAM) address various aspects of these needs, none offer a complete solution.

CVE-2024-38812: Critical RCE Vulnerability Fixed in VMware vCenter Server and Cloud Foundation

On September 17, 2024, Broadcom released fixes for a critical vulnerability impacting VMware vCenter Server and Cloud foundation, tracked as CVE-2024-38812. This vulnerability is a heap-overflow flaw in the implementation of the DCERPC protocol that a remote attacker can use to send specially crafted network packets to vCenter Server, potentially leading to Remote Code Execution (RCE).

CrowdStrike Next-Gen SIEM Innovations Slash Response Time and Simplify SIEM Migrations

Are your legacy technologies slowing down your security operations? You’re not alone. Seventy percent of critical incidents take over 12 hours to resolve. Legacy SIEMs burden security teams with endless manual processes and agonizingly slow search speeds, delaying investigation and response while increasing the risk of a breach. The future of security requires next-gen SIEM technology built for scale and speed, powered by automation and AI.

Why Every Business Needs an Email Continuity Strategy

Email systems are vulnerable to a multitude of risks that can interfere with business operations. It’s impossible to embrace continuity without being fully aware of these risks, what they entail, and the repercussions that may follow. Here are the most common threats that organizations should be prepared for before and after they master BCP: There are many crisis types that can undermine your business continuity unless it’s enhanced with advanced solutions and protocols.