Month: June 2018
-
Citrix NetScaler MAS: How Far Can it be Used for Citrix XenApp and XenDesktop Performance Management?
Citrix NetScaler Management and Analytics System (MAS) is a centralized management solution that provides administrators with the ability …
-
Panorays Debuts With $5 Million Investment
Panorays, an Israel-based company focusing on security for the supply chain, has emerged from stealth mode with a $5 million investment led …
-
What Will Microsoft’s GitHub Buy Mean For Controversial Code?
of rumors, Microsoft officially announced Monday that it will acquire the code repository site GitHub for $7.5 billion in stock. The …
-
Citrix: Does your cybersecurity strategy extend to your suppliers?
With daily pressure to improve cybersecurity operations and to counter new threats, it’s all too easy to lose strategic focus. But if you …
-
Here’s a transaction Transamerica regrets: Transgressors swipe retirees’ personal info
Financial house Transamerica has admitted hackers swiped some of its customers’ sensitive personal information, including social security …
-
RSA Fraud Report: Newsjacking-Based Phishing on the Rise
Angel Grant, director of identity fraud and risk intelligence, RSA RSA’s latest Quarterly Fraud Report shows that so-called “newsjacking” …
-
Analysis: Data Breach Litigation Trends
Just as the cyberthreat landscape is evolving, so too are the data breach lawsuits filed in the wake of attacks, says attorney John …
-
‘EFAIL’ Is Why We Can’t Have Golden Keys
A deep dive into the issues surrounding an HTML email attack. There’s a newly announced set of issues labeled the “EFAIL encryption …
-
IBM Enhances MaaS360 Unified Endpoint Management Platform
IBM announced on June 4 that it is adding a pair of new capabilities to its MaaS360 with Watson, Unified Endpoint Management (UEM) …
-
The Breach Disclosure Double Standard
For many cybersecurity professionals, swift breach disclosure is a matter of do as I say, not as I do. A new survey out today from Thycotic …
-
Reverse Engineering the Analyst: Building Machine Learning Models for the SOC
Many cyber incidents can be traced back to an original alert that was either missed or ignored by the Security Operations Center (SOC) or …
-
Loose .zips sink chips: How poisoned archives can hack your computer
Video Booby-trapped archive files can exploit vulnerabilities in a swath of software to overwrite documents and data elsewhere on a …
●●●