PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Trustwave. The 3 Biggest Database Threats and What Your Security Plan Should Look Like

Serving as the storekeeper of your most sensitive assets, from college admissions applications to resumes of executives, databases are relied upon by organizations worldwide to warehouse and make accessible their information. They are your modern-day treasure chest, essential in helping you manage your data in a world where bits and bytes are growing at staggering […]

Trustwave. The 3 Biggest Database Threats and What Your Security Plan Should Look Like Read More »

GlobalSign supports newly implemented EU electronic invoicing regulation

GlobalSign (www.globalsign.com), a global Certificate Authority (CA) and leading provider of identity and security solutions for the Internet of Things (IoT), today announced that its popular Digital Signing Service (DSS) supports 2014/55/EU, the newly implemented European Union directive regarding electronic invoicing. The directive defines a common standard for e-invoices to reduce the complexity and legal

GlobalSign supports newly implemented EU electronic invoicing regulation Read More »

Trustwave. 5 Perfect Occasions to Carry Out a Proactive Threat Hunt

As organizations learn that sophisticated attackers are dwelling unnoticed on their networks for months – or even years – on end, you may be seeing the need to move beyond basic threat prevention and become more proactive in identifying and eradicating threats. With 83 days the median time between when attackers gain unauthorized access to

Trustwave. 5 Perfect Occasions to Carry Out a Proactive Threat Hunt Read More »

SC Labs awards Sophos XG Firewall five stars

SC Media recently reviewed XG Firewall and awarded it their top 5-star rating across all areas including features, documentation, performance, support, ease of use, and value. In the course of the review, they highlighted many of XG Firewall’s advantages over competing firewall products. The SC Labs Review team examined key areas of the product including

SC Labs awards Sophos XG Firewall five stars Read More »

Sophos. How Intercept X stops MegaCortex ransomware

This month, SophosLabs has been examining a new ransomware attack called MegaCortex that uses layers of automation, obfuscation, and a variety of other techniques to infect victims and spread throughout an environment without detection. Fortunately for Sophos customers, Intercept X leverages multiple layers of defense to stop MegaCortex, including: Blocking PsExec from executing the batch

Sophos. How Intercept X stops MegaCortex ransomware Read More »

Boldon James. Accountability the Next Step in Data Protection

The UK’s Information Commissioner stressed in a speech that nearly one year into GDPR, the regulation is at a critical stage. There have been tremendous strides in data protection since the implementation of the General Data Protection Regulation last May but there’s still plenty more to be done from an accountability perspective, according to the

Boldon James. Accountability the Next Step in Data Protection Read More »

Boldon James. How much does the average employee know about data privacy?

With the impacts and repercussions of the looming California Consumer Privacy Act (CCPA) on the minds of many privacy professionals, new research from MediaPRO shows more work is needed to train U.S. employees of this first-of-its-kind privacy regulation. MediaPRO’s 2019 Eye on Privacy Report reveals 46 percent of U.S. employees have never heard of CCPA,

Boldon James. How much does the average employee know about data privacy? Read More »

Boldon James. Enterprises Must Take Insider Threats More Seriously

Security teams need to consider the possibility of internal as well as external threats While high-profile cybersecurity breaches originating from malicious insiders are on the rise, many cybersecurity professionals continue to focus exclusively on external threats, forgetting that a threat could be sat right beside them. It’s easy to put the notion of an insider

Boldon James. Enterprises Must Take Insider Threats More Seriously Read More »

CyberArk. GDPR Breach Notification By Country: 59,000 Incidents Reported

In May, it will be a year since the enforcement of the EU GDPR began. In the midst of continued and ever growing confusion within the EU caused by the Brexit process, a recent report around another high profile EU issue may have gone unnoticed. DLA Piper recently released a paper looking into incidents reported

CyberArk. GDPR Breach Notification By Country: 59,000 Incidents Reported Read More »

CyberArk Named a 5-Star Security Vendor in 2019 CRN Partner Program Guide

CyberArk is honored to be named a 5-Star Security Vendor – the highest rating in CRN’s 2019 Partner Program Guide. This marks the second consecutive year that CyberArk has received this prestigious designation. This recognition highlights the importance of privileged access management (PAM) as a top security control and enterprise priority. Organizations that are extending

CyberArk Named a 5-Star Security Vendor in 2019 CRN Partner Program Guide Read More »