Security Technology & Operations

Microsoft Defender ATP for Linux Servers on Public Preview

Similar to how Microsoft Defender Advanced Threat Protection (ATP) was deployed for MacOS earlier last year, Microsoft is debuting its endpoint protection agent to Linux...

Webinar: Cybersecurity Priorities in Times of Pandemic

The new remote workforce opens your attack surface. Adjust your security strategy with the current priorities and tackle initiatives that can reduce the suddenly larger...

Zoom Quickly Addresses Zero-Day Vulnerabilities, But Now Is Not the Time to Rest

Amid the surge in cloud-based videoconferencing usage during the COVD-19 pandemic quarantine period, videoconferencing service provider Zoom has moved quickly to address...

GTB Technologies Recognized as Best Data Loss Prevention Solutions Provider for 2020

GTB Technologies has been recognized as “Best Data Loss Prevention Solutions Provider for 2020.” With organizations addressing digital transformation and a growing remote...

Cybersecurity Priorities in Times of Pandemic

The recent events around COVID-19 have been unprecedented, and organizations have taken measures to maintain business continuity. Security can never be an afterthought,...

ManageEngine Desktop Central Remote Code Execution Vulnerability

A remote code execution vulnerability in ManageEngine Desktop Central, with a CVSS score of 9.8, was recently discovered by a third party. To address this gap,...

SC Awards 2020: Qualys Wins Best Vulnerability Management Solution Award

SC Media had its recent 2020 SC Awards Honored in the U.S. event and has awarded Qualys recognition for Best Vulnerability Management Solution in the “Trust Awards” category.

Cybersecurity Priorities in Times of Pandemic Storyboard

The recent events around COVID-19 have been unprecedented, and organizations have taken measures to maintain business continuity. IT is supporting business continuity...

Cybersecurity Priorities Checklist Tool

This tool will help you filter out controls from a predefined list of primary, secondary, and tertiary priority domains and help you visualize a final list of initiatives...

Monitor Remote User Activity via SIEM

The COVID-19 pandemic is an opportunity for cybercriminals as organizations reduce focus on security protocols due to time-sensitive remote access initiatives. SIEM can...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us