PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Trustwave. Three Cybersecurity Challenges Every Enterprise Needs to Address

Cybercriminals are becoming increasingly proficient at infiltrating enterprises to steal data for profit, acquire intellectual assets or to simply cause destruction. High profile breaches frequently making the headlines however are just the tip of the iceberg with global losses due to cybercrime projected to hit a staggering eight trillion dollars by 2020. Enterprises today are […]

Trustwave. Three Cybersecurity Challenges Every Enterprise Needs to Address Read More »

CyberArk Introduces Privileged Access Security Assessment Tool

Privileged access security is a key pillar of an effective security program. We take our role as a trusted adviser to our customers very seriously and are constantly looking for new ways to help evolve existing privileged access security programs – or guide organizations that are getting started – to prioritize risk and identify opportunities

CyberArk Introduces Privileged Access Security Assessment Tool Read More »

Boldon James. Why New Privacy Regulations Are A Business Enabler, Not An Enemy

As Shep Hyken recently noted, personalization continues to become more personal in the customer service field. Personal information (PI) is the future of business, as it provides clients with a customized experience and helps businesses eventually sell more. However, it means companies will have to curb the wave of consumer rights advocacy and comply with at

Boldon James. Why New Privacy Regulations Are A Business Enabler, Not An Enemy Read More »

Sophos Synchronized Security awarded Best Threat Intelligence Technology at the SC Awards 2019 Europe

Cybersecurity isn’t getting any easier. To better understand the day-to-day reality for IT teams we recently commissioned a survey of 3,100 IT managers in 12 countries. This independent, vendor-agnostic study revealed a number of common challenges: Security: 68% of organizations had experienced a threat that got through their defenses in the last year, 90% of

Sophos Synchronized Security awarded Best Threat Intelligence Technology at the SC Awards 2019 Europe Read More »

BlueKeep: firewall best practices from Sophos

CVE-2019-07-08, nicknamed BlueKeep, is a critical remote code execution vulnerability in Windows’ Remote Desktop Services. The bug is considered ‘wormable’ and so severe that Microsoft took the highly unusual step of including patches for the unsupported Windows XP and Windows Server 2003 in its May Patch Tuesday output, alongside patches for the affected operating systems

BlueKeep: firewall best practices from Sophos Read More »

Sophos has acquired MDR specialists Rook Security

Cybercriminals are resourceful, organized and relentless, and businesses need 24/7 monitoring and management of their network. Yet many organizations don’t have the expertise or in-house security teams to optimally configure and manage security around-the-clock. The solution? Third-party Managed Detection and Response (MDR) services that augment an organization’s security capabilities with the continual monitoring, advanced analytics

Sophos has acquired MDR specialists Rook Security Read More »

Trustwave. So, You’ve Been Breached: 9 Steps to Mitigate the Fallout

Discovering that you’ve been the victim of a breach is never pleasant. Perhaps your customers’ data was stolen and now sits in the wilds of the internet. Maybe your intellectual property and trade secret were compromised. Or you could be concerned the adversaries are still actively lurking on your network. If this is you, you

Trustwave. So, You’ve Been Breached: 9 Steps to Mitigate the Fallout Read More »

Trustwave. The 3 Biggest Database Threats and What Your Security Plan Should Look Like

Serving as the storekeeper of your most sensitive assets, from college admissions applications to resumes of executives, databases are relied upon by organizations worldwide to warehouse and make accessible their information. They are your modern-day treasure chest, essential in helping you manage your data in a world where bits and bytes are growing at staggering

Trustwave. The 3 Biggest Database Threats and What Your Security Plan Should Look Like Read More »