Attack Patterns Uncover Defensive Strategies

This is a summary of an article written for ThreatPost by Fortinet’s Global Security Strategist, Derek Manky. The entire article can be accessed here. In Fortinet’s Q1 2019 Threat Landscape Report, threat analysts at FortiGuard Labs chose to dig into data from the company’s web filtering service. Here is what they Continue Reading

Keep your Mail Server Running Smoothly with Today’s MDaemon Maintenance Update

To ensure MDaemon and its plugins provide the most up-to-date security and best performance, we often provide maintenance updates to help our customers get the most out of their business email and collaboration server. Today, we’ve released MDaemon 19.0.2. With this update, we’ve squashed a few minor bugs and updated Continue Reading

Tapping Veterans’ Unique Skillset to Fill the Cybersecurity Talent Pool

Finding trained security professionals is one of the hardest tasks an organization faces today. Colleges and universities are doing what they can to educate the next crop of cybersecurity professionals, but though graduates may have book knowledge, few have real-world experience and know-how within an enterprise security environment. Part of Continue Reading

Bolstering Endpoint Security

For many organizations, endpoint security remains the weak link in their security strategy. While organizations are able to ensure that endpoint clients are installed on company-owned assets, security becomes more challenging when workers use their personal devices for work-related activities. The organizational risks introduced several years ago by BYOD have been compounded Continue Reading

WordPress 5.1.1 Security and Maintenance Release

WordPress 5.1.1 is now available! This security and maintenance release introduces 10 fixes and enhancements, including changes designed to help hosts prepare users for the minimum PHP version bump coming in 5.2. This release also includes a pair of security fixes that handle how comments are filtered and then stored in Continue Reading

Prepare Now for 5G Security Transformation

5G Security Implications Digital transformation efforts underway at many organizations are just the start. Supporting 5G’s new services and business opportunities will require organizations to significantly reshape many of the traditional relationships between networks, local and mobile computing resources, and end users. These changes will have a tremendous impact on Continue Reading

Reactive vs. Proactive Cybersecurity: 5 Reasons Why Traditional Security No Longer Works

Security sprawl is a real challenge for most organizations, especially now as networks are expanding and evolving rapidly, and security resources are increasingly limited. If you’re like most companies, you’ve loaded your wiring closet with a hodge-podge of perimeter defenses over the years. Most of these tools operate in isolation, Continue Reading

Using Services to Fill Critical Security Gaps

Adopting Security Services To address these challenges, along with the growing cybersecurity skills gap that is impacting organizations of every size, businesses need to consider adopting security services to supplement or even replace their existing security programs and solutions. This approach can tighten security, fill critical gaps, and address issues Continue Reading

Where eagles snap – A closer look

A couple of weeks ago, we talked about snap security, taking a journey through the eyes of a developer and handing over to a user who wants to install applications from the Snap Store. We discussed concepts like application confinement, interfaces, store review, and automatic updates. Today, we will look Continue Reading

>