Category

Blog
Written by Ryan Stewart Attackers compromised Microsoft support agent’s credentials and gained access to view ‘limited’ number of users’ email account information.Upon learning about the incident, Microsoft immediately disabled the compromised support agent’s credentials. What is the issue – Microsoft notified its users via email that a certain ‘limited’ number of users who use web email...
Read More
What does your company culture feel like? Do you work in a positive environment? Productivity begins with the employees of a corporation. If happiness is amongst the workforce, productivity and success increases. That is not a theory, judging by statistics, it is a fact. Company culture has changed as our generations have. I speak for...
Read More
Written By: Jen Toscano As enterprises embrace digital transformation, they must find a new way to manage networking and security. Many are turning to SD-WAN to reduce MPLS costs, simplify branch IT, increase agility, and deliver an improved user experience. But, securing SaaS and internet-bound traffic for all users at all locations—without compromising on security—can present obstacles....
Read More
Written by: Dan Shelton One of the most tragic things in the world of IT is when people adopt a new technology but don’t adopt a new way of working. The reason this is a problem is that almost every piece of enterprise software is much more than the application itself. It’s also a mindset,...
Read More
Written by: Joanna Flower CrowdStrike’s incredible success at this year’s RSA event included winning the SC Magazine 2019 Trust Award for Best Threat Intelligence Technology for Falcon X™, our automated threat intelligence solution and part of the comprehensive CrowdStrike® Falcon® platform. This award was presented at a dinner hosted by SC Magazine on Tuesday, March 5, during...
Read More
Written by: Deepen Desai Once seen as the ultimate protection for data being transmitted over the internet, encryption has become a vast playground for cybercriminals. Zscaler ThreatLabZ, the research organization at Zscaler, analyzed the encrypted traffic traversing the Zscaler cloud in the second half of 2018 and prepared a report of our findings. The Zscaler cloud processes...
Read More
In 2019, the top fortune 1000 companies are adopting cutting edge solutions that empower the remote worker to promote better productivity. These solutions increase teamwork so employees can focus on the core business instead of being distracted in a large corporate environment. With cloud based security solutions, the employer has maximum visibility of productivity while...
Read More
Written by: Brian Burke and John Crotty of Crowdstrike In the latest customer choice recognitions for endpoint detection and response (EDR), CrowdStrike stands as the highest rated vendor in the January 2019 Gartner Peer Insights Customers’ Choice for EDR.  That’s right: We did it — AGAIN!  On the heels of being named the highest rated...
Read More
Written by: Rainer Rhem Protecting data has become increasingly difficult. Between a lack of awareness, unintended user actions, system glitches, and increasingly sophisticated cyber adversaries, preventing data loss is no mean feat.  With increasing risks and expanding regulations for data protection, organisations must focus on closing security gaps that have emerged in the era of...
Read More
The true beginning to cybersecurity within any organization is awareness. Are you aware of your cyber surroundings? Are you and your employees trained and prepared to face a cyberthreat? You may know of the common cyber threats that cross your paths such as phishing, smishing, malware, and ransomware, but can you and your employees recognize every threat?...
Read More
1 2 3 4 9