Verizon Advanced SASE solution merges SD WAN capabilities with network security services

Verizon Business announced the launch of its new Advanced Secure Access Service Edge (SASE) solution, merging SD WAN capabilities with hybrid network connectivity and security services to create a unified, cloud-delivered service able to meet the incre… Continue reading Verizon Advanced SASE solution merges SD WAN capabilities with network security services

Top Cyber Security Challenges Post Lockdown

By Sam Jones | Cyber Tec Security
Not too long ago things were looking bleak for the world, still under the dark cloud of the COVID pandemic, but with vaccine rollouts now taking place worldwide, there is finally a light at the end of the tun… Continue reading Top Cyber Security Challenges Post Lockdown

Appgate announces three promotions within its executive leadership team

Appgate announced several promotions within its executive leadership team: Jason Garbis, who has served as Appgate’s Sr. Vice President of Products has been promoted to the new role of Chief Product Officer; Kurt Glazemakers who was the Sr. Vice Presid… Continue reading Appgate announces three promotions within its executive leadership team

Mosyle integrates with Okta and Ping Identity to enforce security standardization for Mac devices

Mosyle announced new integrations with Okta and Ping Identity for Mosyle Fuse and Mosyle Business customers. With this release, enterprises are now able to use Mosyle Auth 2 – the company’s single sign-on (SSO) solution purpose built for macOS – with O… Continue reading Mosyle integrates with Okta and Ping Identity to enforce security standardization for Mac devices

Using Fake Reviews to Find Dangerous Extensions

Fake, positive reviews have infiltrated nearly every corner of life online these days, confusing consumers while offering an unwelcome advantage to fraudsters and sub-par products everywhere. Happily, identifying and tracking these fake reviewer accounts is often the easiest way to spot scams. Here’s the story of how bogus reviews on a counterfeit Microsoft Authenticator browser extension exposed dozens of other extensions that siphoned personal and financial data. Continue reading Using Fake Reviews to Find Dangerous Extensions

Inseego collaborates with Net4 to bring the benefits of private 5G infrastructure to enterprise networks

Inseego announced a collaboration with Net4 to drive and simplify the deployment of 5G private networks for enterprise customers across the United Kingdom and Europe. The joint solution will leverage Net4’s platform for ultra-reliable 5G connectivity a… Continue reading Inseego collaborates with Net4 to bring the benefits of private 5G infrastructure to enterprise networks

Arctic Wolf Managed Security Awareness prepares employees to neutralize attacks

Arctic Wolf launched Arctic Wolf Managed Security Awareness, a radical new approach to security and awareness training that helps organizations build cyber resilience against social engineering, phishing attacks, and credential theft. Arctic Wolf is th… Continue reading Arctic Wolf Managed Security Awareness prepares employees to neutralize attacks

Recycle Your Phone, Sure, But Maybe Not Your Number

Many online services allow users to reset their passwords by clicking a link sent via SMS, and this unfortunately widespread practice has turned mobile phone numbers into de facto identity documents. Which means losing control over one thanks to a divorce, job termination or financial crisis can be devastating.

Even so, plenty of people willingly abandon a mobile number without considering the potential fallout to their digital identities when those digits invariably get reassigned to someone else. New research shows how fraudsters can abuse wireless provider websites to identify available, recycled mobile numbers that allow password resets at a range of email providers and financial services online. Continue reading Recycle Your Phone, Sure, But Maybe Not Your Number

85% of breaches involve the human element

The Verizon report examines more breaches than ever before, and sheds light on how the most common forms of cyber attacks affected the international security landscape during the global pandemic. This year’s report saw 5,258 breaches from 83 contributo… Continue reading 85% of breaches involve the human element