Security News
Whether you're evaluating an EDR for the first time or looking to replace your EDR, as an information security professional, you need to be aware of the gaps prior already to implementation so you can best prepare how to close the gaps. It's important to understand that each company is unique, and an EDR that a large company uses might not necessarily be the technology that works best when you are leading a small security team, even if you're within the same industry vertical.
Is your organization making a move to the cloud? Download the latest eBook from² to get tips and insights for a secure and successful migration. Inside, Certified Cloud Security Professionals share how to tackle risks and challenges as cybersecurity practices shift to a cloud-based paradigm.
Amazon has addressed a number of flaws in its Kindle e-reader platform that could have allowed an attacker to take control of victims' devices by simply sending them a malicious e-book. Dubbed "KindleDrip," the exploit chain takes advantage of a feature called "Send to Kindle" to send a malware-laced document to a Kindle device that, when opened, could be leveraged to remotely execute arbitrary code on the device and make unauthorized purchases.
Secure software development and DevSecOps are growing in importance as organizations increasingly rely on cloud infrastructures for critical applications. In the² eBook, The Art & Science of Secure Software Development, CSSLPs around the world share how becoming certified has helped them advance their careers - and avoid costly errors.
Healthcare is a growing field where the importance of security and privacy cannot be overstated. Many security professionals have gravitated toward this dynamic field, enhancing their skills and knowledge by earning the² HealthCare Information Security and Privacy Practitioner credential.
A new provocative eBook: "5 Questions to Determine: Is Your EDR Providing the Best Bang for Your Buck?" helps security executives who currently use an EDR solution determine if they're continuing to get their "Bang for the buck" from their EDR provider when compared to newer, equally-priced technologies as XDR. It's also an excellent resource for companies who are in the steps of choosing an EDR solution to deploy. Let's quickly look at the five questions you should ask to help decide if you should stay with your EDR solution or consider upgrading to an XDR solution.
Many organizations are trading on-premises systems for cloud-based solutions, a move that brings virtually limitless scalability, storage and accessibility - usually at a lower cost and with reduced complexity. Ignoring the gaps that come with relying on a single vendor dramatically increases your risk profile and potential for a negative business impact due to an attack or unintended breach.
Apple's free Business Manager service provides a simple, web-based portal for IT administrators to deploy all these disparate devices from one place. Jamf Pro delivers unified endpoint management for Apple devices and includes features such as Smart Groups that intelligently manage environments.
This 17-page e-book examines the increasing pressures faced by cybersecurity teams, risks of ineffective alert triage and new automation capabilities that dramatically improve the efficiency of...
Download this 11-page e-book with eight real-world use cases to see how security orchestration, automation and response can improve your team's productivity and efficiency by automating security operations workflows. The following use cases are described in the e-book, but SOAR can address an unlimited number of use cases and automate 80-90 percent of your security team's typically manual tasks.