Tag

cybersecurity
Written by Hamilton Yang, Sat Nath, and Peter Uys from Crowdstrike The recent discovery of the Remote Code Execution (RCE) vulnerability CVE-2018-4407 in Apple’s XNU operating system kernel may have been a cause for concern among organizations using Macs but CrowdStrike® is helping customers identify vulnerable Macs in their environments with a new dashboard. The XNU OS...
Read More
Black Hat 2018 and DEF CON 26
AGT Blog | The annual DEF CON and Black Hat Conference brings together some of the greatest security researchers and instructors from around the world, providing security information in a vendor neutral environment. The back-to-back conferences recently wrapped up in Las Vega, Nevada, for 2018
Read More
data center decommissioning
Data Center Decommissioning Tips Investing in new equipment, applications, and technology solutions is a top priority for many IT and security professionals. But when it comes to “out with the old and in with the new”, what exactly happens to the old legacy systems, applications and hardware equipment? In this blog post, we look at...
Read More
Proofpoint’s Latest Quarterly Threat Report – May 2018, provides an update on the latest observed trends and takeaways on today’s advanced attacks. Here are some of the key takeaways from the report. Email Threats And Email Fraud On The Rise Email fraud is growing in both scale and pervasiveness. Successful email-based attacks can result in...
Read More
Cybersecurity Tips For Business Travelers Get ready to travel with these top cyber security tips. Laptop ☑ Phone ☑ Chargers ☑ Business cards ☑ Toothbrush ☑ Back up files…? Update Software…? When you’re traveling, whether for business or pleasure, chances are you’ll be connecting to unknown networks. That is, unless you’re going on a digital detox and will be spending...
Read More
Protect Your Brand Is it harder to protect your brand in this digital age? In this new landscape of constant security breaches, companies are fighting to protect their networks from attack and working to preserve their company brand.  Businesses shoulder a responsibility for protecting the growing volume of private customer information. Security Breaches Are Costly...
Read More
1 2 3 4