May 2021 Patch Tuesday: Prioritize Critical Remote Code Execution and New Wormable CVEs
Last month, teams participating in a global hacking contest, Pwn2Own, succeeded in exploiting several Microsoft products on the first day of the…
Last month, teams participating in a global hacking contest, Pwn2Own, succeeded in exploiting several Microsoft products on the first day of the…
MacOS is ubiquitous in enterprise environments, with no signs of slowing down. Recent IDC analysis shows macOS devices have reached a whopping…
Virgin Hyperloop, a global startup with a world-changing mass transit vision and the intellectual property (IP) to make it happen, remediates “no…
Organizations adopting cloud-native applications face an increasingly diverse and sophisticated threat landscape, in addition to proliferating devices and expanding remote workforces. Meeting…
How will your security team react when a sophisticated adversary has you in their sights? Will your team act in time to…
The threat landscape is constantly evolving, with an increase in incidents and breaches being reported rapidly across industries. In 2020, the number…
With cloud adoption surging and workforces becoming increasingly remote, it is more critical than ever for organizations to maintain comprehensive real-time visibility…
The year 2021 has required a lot of attention from cyber-savvy Microsoft users so far, considering the quantity and severity of vulnerabilities…
Containers provide a wide range of benefits to both developers and system administrators — increased agility, flexibility and scalability among them. With…
More than ever, organizations are grappling with how to secure cloud-native applications. Protecting these applications — a combination of containers, virtual machines,…