Netskope Announces Zero Trust Network Access Updates

Netskope Announces Zero Trust Network Access Updates

Netskope has announced key enhancements to Netskope Private Access, the cornerstone of Netskope’s security platform’s Zero Trust Network Access (ZTNA). Netskope customers can now apply zero-trust principles seamlessly across a wide range of hybrid workplace security needs, including SaaS, IaaS, private applications, web, email, and endpoint devices. The new normal of hybrid working means that … Read more

Discovery of connected devices / IoT and security auditing in corporate networks

Discovery of connected devices / IoT and security auditing in corporate networks

Today’s business networks are complex environments with different types of wired and wireless devices connecting and disconnecting. Current device discovery solutions have primarily focused on identifying and monitoring servers, workstations, laptops, and infrastructure devices such as network firewalls, switches, and routers, because organizations’ most valuable information assets are stored, processed, and transfer across those devices. … Read more

Comprehensive and easy cybersecurity for Lean IT security teams starts with XDR

Comprehensive and easy cybersecurity for Lean IT security teams starts with XDR

Violations don’t just happen to big companies. Threat actors are increasingly targeting small businesses. In fact, 43% of data breaches involved small and medium-sized businesses. But there is a glaring discrepancy. Larger companies often have the budget to keep their lights on if they are breached. Most small businesses (83%), however, do not have the … Read more

What are the Eight Essentials (and why should non-Australians care)?

In 2017, the Australian Cyber ​​Security Center (ACSC) published a set of mitigation strategies designed to help organizations protect against cyber security incidents. These strategies, which became known as the eight essentialsthey are specifically designed for use on Windows networks, although variations of these strategies are commonly applied to other platforms. What is the Eight … Read more

How hackers choose their victims

How hackers choose their victims

The application of the “double extortion” technique, also known as “pay now or be raped”, emerged as a turning point last year. May 6, 2022 is a recent example. The State Department said the Conti ransomware strain was the most expensive in terms of payments made by victims as of January.. Conti, a ransomware-as-a-service (RaaS) … Read more

Chinese LuoYu Hackers Use “Man-on-the-Side” Attacks to Implement WinDealer Backdoor

Chinese LuoYu Hackers Use “Man-on-the-Side” Attacks to Implement WinDealer Backdoor

An “extremely sophisticated” Chinese-speaking advanced persistent threat (APT) actor dubbed luoyu It has been observed using a malicious Windows tool called WinDealer that is delivered via man-on-the-side attacks. “This innovative development allows the actor to modify network traffic in transit to insert malicious payloads,” Russian cybersecurity firm Kaspersky said. said in a new report. “Such … Read more

Global Integrated Security Market Poised to Reach $10 Billion

Global Integrated Security Market Poised to Reach  Billion

LONDON, June 02, 2022 (GLOBE NEWSWIRE) — The Internet of Things (IoT) is one of the most exciting developments in the technology industry, creating new avenues for innovation, collaboration and growth. From everyday devices to space technology, IoT has immense value for virtually every aspect of modern life. However, new developments in the cyberattack landscape, … Read more

Acumera Expands Services and Market Reach Through Acquisition

Acumera Expands Services and Market Reach Through Acquisition

AUSTIN, Texas and FORT LAUDERDALE, Fla., June 1, 2022 (GLOBE NEWSWIRE) — Acumera, a leading provider of software-as-a-service (SaaS) solutions for edge computing, network operations, visualization, and security, today announced the acquisition of Netsurion’s secure edge networking business. Under the agreement, Acumera will acquire Netsurion’s all-in-one network management, resiliency, compliance and security solution, as well … Read more

Acumera Expands Services and Market Reach by Acquiring Secure Edge Networking from Netsurion | News

Acumera Expands Services and Market Reach by Acquiring Secure Edge Networking from Netsurion |  News

AUSTIN, Texas and FORT LAUDERDALE, Fla., June 1, 2022 (GLOBE NEWSWIRE) — Acumera, a leading provider of software-as-a-service (SaaS) solutions for edge computing, network operations, visualization, and security, today announced the acquisition of Netsurion’s secure edge networking business. Under the agreement, Acumera will acquire Netsurion’s all-in-one network management, resiliency, compliance and security solution, as well … Read more

EU Gets New Law To Fight Hackers In Critical Sectors – POLITICO

EU Gets New Law To Fight Hackers In Critical Sectors – POLITICO

Faced with a wave of cyberattacks, the European Union asks its critical sectors to strengthen their defenses. Earlier Friday, negotiators for a new EU cybersecurity directive reached a deal that will force sensitive industries such as banking, energy, telecommunications and transport to better protect their networks and invest in cybersecurity, in a effort to prevent … Read more