Fletch releases two security offerings to help organizations stay ahead of cybercriminals

Fletch launched their first two offerings that continuously analyzes trending threats and insider risk, free of charge. For the past two and half years, Fletch has collaborated with top industry experts to create a platform where all it takes is a few … Continue reading Fletch releases two security offerings to help organizations stay ahead of cybercriminals

Fletch releases two security offerings to help organizations stay ahead of cybercriminals

Fletch launched their first two offerings that continuously analyzes trending threats and insider risk, free of charge. For the past two and half years, Fletch has collaborated with top industry experts to create a platform where all it takes is a few … Continue reading Fletch releases two security offerings to help organizations stay ahead of cybercriminals

Corporate attack surface exploding as a result of remote work

74% of organizations attribute recent business-impacting cyberattacks to vulnerabilities in technology put in place during the pandemic. The data is drawn from a study of more than 1,300 security leaders, business executives and remote employees conduc… Continue reading Corporate attack surface exploding as a result of remote work

Tenable to acquire Accurics to expand its IaC and cloud security capabilities

Tenable announced that it has entered into a definitive agreement to acquire Accurics, a pioneer in delivering cloud-native security for both DevOps and security teams. Accurics enables the programmatic detection and mitigation of risks in Infrastructu… Continue reading Tenable to acquire Accurics to expand its IaC and cloud security capabilities

Microsoft patches actively exploited zero-day (CVE-2021-36948), more Print Spooler flaws

Microsoft’s August 2021 Patch Tuesday is pretty lightweight, through it covers a wide variety of Microsoft solutions. 44 CVE-numbered security holes have been plugged, seven of which are critical, and one is actively exploited (CVE-2021-36948). F… Continue reading Microsoft patches actively exploited zero-day (CVE-2021-36948), more Print Spooler flaws

NIST selects Ivanti on Implementing A Zero Trust Architecture project

Ivanti announced that it has been selected by the National Institute of Standards and Technology’s (NIST’s) National Cybersecurity Center of Excellence (NCCoE) to participate as a collaborator in the Implementing A Zero Trust Architecture project. The … Continue reading NIST selects Ivanti on Implementing A Zero Trust Architecture project

Illumio Core advancements help protect key assets from cyberattacks and ransomware

Illumio announced new innovations in Illumio Core which automate, accelerate, and simplify the path to a zero trust posture. Cyberattacks and ransomware are most successful when they break through the perimeter and move, often undetected, throughout an… Continue reading Illumio Core advancements help protect key assets from cyberattacks and ransomware

Microsoft Patch Tuesday, July 2021 Edition

Microsoft today released updates to patch at least 116 security holes in its Windows operating systems and related software. A half of dozen of the vulnerabilities addressed today are under active attack, according to Microsoft. Continue reading Microsoft Patch Tuesday, July 2021 Edition

Microsoft Issues Emergency Patch for Windows Flaw

Microsoft on Tuesday issued an emergency software update to quash a security bug that’s been dubbed “PrintNightmare,” a critical vulnerability in all supported versions of Windows that is actively being exploited. The fix comes a week ahead of Microsoft’s normal monthly Patch Tuesday release, and follows the publishing of exploit code showing would-be attackers how to leverage the flaw to break into Windows computers. Continue reading Microsoft Issues Emergency Patch for Windows Flaw

IBM provides Kestrel, a threat hunting tool, to Open Cybersecurity Alliance

Open Cybersecurity Alliance (OCA) announced it has accepted IBM’s contribution of Kestrel, an open-source programming language for threat hunting that is used by Security Operations Center (SOC) analysts and other cybersecurity professionals. Kestrel s… Continue reading IBM provides Kestrel, a threat hunting tool, to Open Cybersecurity Alliance