Endpoint and Cloud Security
In our interconnected world, the growth of threats to industrial control systems (ICS) and operational technology (OT) continues to rise, putting organizations…
Compromises of cloud accounts have been a hot topic in the security industry lately, but the common themes we are seeing, such…
One lesson from 2020 is clear: Patching security holes must be a high priority for security operations teams throughout this year and…
With today’s workforce moving outside of the physical office, modern security architectures have moved away from the “hard exterior, soft interior” model…
The good news keeps rolling in for CrowdStrike and the CrowdStrike Falcon Complete™ MDR team. Yesterday CrowdStrike was named a “Leader” in…
If all threats were equal, it might be possible to make the entire remediation process autonomous. But all cybersecurity professionals know that…
Practicing cybersecurity in the healthcare sector is increasingly challenging, with rapidly evolving technology requirements forcing infrastructure growth and complexity. While adversaries said…
In our recent blog, “See the COMPLETE Picture: New Study Reveals the Benefits of Fully Managed Detection and Response,” we reviewed Forrester’s…
In this Microsoft Patch Tuesday update, we discuss several critical vulnerabilities, including a newly released zero-day targeting Internet Explorer that has already…
Between the growth of cloud-native applications and the demands of faster application delivery, the use of containers is widely predicted to continue…