Bob Erdman appeared on this week’s Microsoft Threat Intelligence Podcast to discuss the joint effort between Microsoft and Fortra to tackle the illegal use of cracked Cobalt Strike software.
Fortra’s Tyler Reguly was recently featured on the Adopting Zero Trust podcast, where he delved into the critical role of vulnerability management within a Zero Trust framework.
Theo Zafirakos recently spoke with The SupplyChainBrain Podcast to address third-party risk management, detail incident response plans and answer the question everyone is asking: Is artificial intelligence the answer to, or bane of, supply chain cybersecurity?
Discover the advantages and disadvantages of open-source IT tools and how Halcyon's offerings for Linux, Windows, AIX, and IBM i multi-platform environments compares.
Supply chain cyberattacks can trigger widespread disruptions, impacting multiple business functions and areas with compounded, cascading effects. In this article in Supply Chain Digital, Theo Zafirakos outlines strategies companies can put in place to guard against supply chain attacks.
Cary Hudgins and Mike Jones recently joined the IT Security Wire podcast to dive into the vital role of email protection in business resilience. Since emails are often the first target for cyberattacks, they discussed cutting-edge solutions and emphasized the need for integrating robust email security with your operating platforms.
Session DetailsSecurity leaders of financial institutions have some of the most demanding job descriptions in the industry. Threat actors go where the money goes, and let’s just say that a certain industry has a giant sign hanging above it.As teams try to crack down on enterprise security, cybercriminals continue to attack on multiple fronts. With the complexity of the financial sector increasing...
You don’t know you’ve experienced a ransomware attack until you’ve been delivered the note. Understanding more about the ransomware process can help you stop the attack in the act before it escalates that far.
Cybersecurity experts offer insights into safeguarding digital assets and protection strategies. Explore the emerging role of AI in enhancing cybersecurity efforts.
Supply chain attacks disrupt not only the targeted company but also the entire logistical and distribution network, posing significant challenges and costs. Theo Zafirakos addresses how companies should respond to the rise in these attacks on Manufacturing Business Technology's Security Breach Podcast.
Recent years have seen confusion around how to define vulnerability management. In this blog, security expert Antonio Sanchez sets the record straight, exploring the technology’s process and use cases.
Your organization might have many cybersecurity defenses in place, but defenses alone are not enough to protect you from today’s multi-faceted cyberattacks. Proactively adding a layer of offensive security assessment and testing helps you pinpoint your system weaknesses before they are exploited. Proactive security measures help you stay ahead of attackers by:Identifying vulnerabilities and...
A phishing campaign targets businesses to compromise Facebook and Instagram accounts with access to Meta Business Suite. In this Cyber Defense Magazine article, Michael Tyler discusses the tactics behind the campaign and shares tips to stay safe.
Microsoft issued 139 unique CVEs in its July Patch Tuesday update. Tyler Reguly spoke with Dark Reading and discussed the CVEs that affect Microsoft SQL Server.