Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

5 major risks that impact vulnerable network devices

Working from home has become our new normal, with many of our jobs being performed remotely. The experience of working remotely can be as seamless as it was from our workplace, with all the technological advancements available today. Businesses have also put network security on the forefront by implementing use of virtual private networks (VPNs). This enables users to securely access confidential information hosted on the organizations’ servers.

Secure DevOps at the Edge with Sysdig and IBM

Innovative companies are looking to take advantage of cloud-native technologies beyond the data center to deliver faster innovation and competitive advantage at the edge. Recognizing the need for a common approach to create, deploy, run, secure, monitor, maintain and scale business logic and analytics applications wherever your business takes you, IBM today announced its edge computing offerings, including the IBM Edge Application Manager.

Getting Zoom Security Right - 8 Tips for Family and Friends

If you’ve read a newspaper or watched the news in the past few weeks, you’ll notice one common topic that all the major news outlets are discussing… COVID-19. Right now, many companies are trying to provide employee guidance during this worldwide pandemic, as governments ask those who can to work from home in an effort to slow the spread.

How were we Hacked? Part 1

When we read about hackers, we either think of people in Anonymous wearing Guy Fawkes masks or else that film from the mid-’90s were roller blade rolling teens bring down the baddies with elaborate rabbits and trojan horses. While complicated CIA type hacking may exist the VAST majority of hacking is simply someone getting your password and logging in online just like you would The VAST majority of hacking is simply someone getting your password and logging in online just you would

Tips for Managing Third-Party Risk in Health Care

The healthcare industry possesses the crown jewels that the bulk of attackers are after: Personally Identifiable Information (PII). Data has become the new currency in the digital underground, consisting primarily of social security numbers, credit card information, health information, and passwords.

5 defensive COVID-19 actions IT managers can take now

As if there wasn’t enough to worry about these days, cyber attacks have taken a sharp uptick since the COVID-19 pandemic began this year. From January to March, AT&T Alien Labs Open Threat Exchange (OTX) saw ​419,643 indicators of compromise (IOC) related to COVID-19, including a​ 2,000% month-over-month increase from February to March. Cybercriminals are taking advantage of the shift to remote working, increasing their volume of attacks by nearly 40% in the last month.