Category: Help Net Security

Baseline standards for BYOD access requirements

49% of enterprises across Europe currently have no formal Bring-Your-Own-Device (BYOD) policy in place, meaning they have no visibility into or control over if and how employees are connecting personal devices to corporate resources, according to a Jamf survey. With…

Cybersecurity pros battle discontent amid skills shortage

The cybersecurity skills crisis continues in a multi-year freefall that has impacted 71% of organizations and left two-thirds of cybersecurity professionals stating that the job has become more difficult over the past two years—while 60% of organizations continue to deflect…

Insight Managed Cloud Services streamline cloud management

Insight Enterprises has expanded its services portfolio with a new global managed cloud offering to simplify how enterprises scale their cloud use. Insight Managed Cloud Services enable a fully managed experience that lifts the burden of cloud management from IT…

Old vulnerabilities are still a big problem

A recently flagged phishing campaign aimed at delivering the Agent Tesla RAT to unsuspecting users takes advantage of old vulnerabilities in Microsoft Office that allow remote code execution. “Despite fixes for CVE-2017-11882/CVE-2018-0802 being released by Microsoft in November, 2017 and…

D2iQ DKP 2.6 improves Kubernetes management capabilities

D2iQ announced the newest updates to its multi-cluster Kubernetes management platform, D2iQ Kubernetes Platform (DKP). DKP 2.6 features the new DKP AI Navigator, an AI assistant that enables enterprise organizations to overcome the skills gap, one of the biggest challenges…

Cybercriminals target MS SQL servers to deliver ransomware

A cyberattack campaign is targeting exposed Microsoft SQL (MS SQL) databases, aiming to deliver ransomware and Cobalt Strike payloads. The attack campaign The attackers target exposed MS SQL servers by brute-forcing access credentials. After having successfully authenticated, they start enumerating…

TXOne Networks Edge V2 isolates security breaches

TXOne Networks announced the second generation of its Edge engine for eliminating the spread of operational technology (OT) network infections and safeguarding reliable operations. Edge V2 delivers automatic rule generation, enabling effortless network segmentation in complex, large-scale OT environments. Our…

Fasoo collaborates with Egnyte to simplify data governance

Fasoo and Egnyte announced a partnership that will allow organizations to encrypt any Egnyte-managed file and inject Egnyte permissions directly into the protected file, ensuring that governance is maintained wherever the file goes. Colter Carambio, EVP and CRO at Fasoo,…