Get up to speed on the most impactful IT trends and discover how JumpCloud is leading the charge. We'll dive into JumpCloud AI, and cover recent Reporting Releases.
Join us as we discuss the new Reporting capabilities being brought to the JumpCloud Admin Portal with Reporting v. 2.0. This update introduces a new UI that allows admins to view reporting data directly in the UI customization and filtering to help you find the data you need.
We're unpacking key insights from JumpCloud's latest MSP Performance report. Plus, join us as we explore the benefits, use cases, and best practices of PAM with our recent acquisition of VaultOne.
Is your VPN a silent entry point for attackers? Credential stuffing and password spraying exploit weak authentication, giving attackers a way into VPNs and edge network devices — making them prime targets in today’s identity-driven threat landscape. In this snippet, our expert breaks down: Watch the full webinar: Adapting to a New Paradigm in Security – Implementing ITDR in Your SOC: netwrix.com/go/adapting-to-a-new-paradigm-in-security-yt.
On this episode of the Cybersecurity Defenders Podcast we speak with Robert Boles, Founder / CEO of BLOKWORX. A veteran of the U.S. Marine Corps, Rob founded BLOKWORX in 2006 to further his passion for creating fast, secure networks. Since 1999 Rob was a core technical contributor and presenter on an Advanced IP Team, delivering bleeding edge WAN and Managed Security services to Small, Mid-level and Fortune 500 businesses around the world.
A customer opens their bank’s login page. At least, that’s what they think. The design is flawless, the fields are familiar. But it’s a cloned site built to harvest credentials. Within seconds, their details are replayed against the genuine portal. To the bank’s defenses, it looks like business as usual — same username, same password, same MFA prompt.
A new and dangerous self-replicating worm has been identified targeting the JavaScript repository NPM, infecting at least 187 code packages. The novel malware strain is engineered to steal credentials from developers and publish them to a new public GitHub repository. The worm automatically propagates itself by copying its code into the top 20 most popular packages maintained by the compromised user and publishing them as new versions.