PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Privileged Access Security for Dummies: A Practical, “How-To” Guide from CyberArk

Savvy security practitioners understand that one of the most important, preventative steps they can take to bolster their cyber security posture is to secure privileged access – including privileged accounts, credentials and secrets. Protecting privilege is a process, and it’s often a key element of an enterprise-wide security program. Perhaps you are wondering if there […]

Privileged Access Security for Dummies: A Practical, “How-To” Guide from CyberArk Read More »

Sophos ranks #1 for endpoint protection by SE Labs

Sophos Intercept X Advanced was the top-ranked solution for both enterprise endpoint protection and small business endpoint protection in the new SE Labs endpoint protection test report (Apr-Jun 2018). Sophos received a 99% protection accuracy rating, 100% legitimate accuracy rating and 100% total accuracy rating. Each of these scores were the highest in the test.

Sophos ranks #1 for endpoint protection by SE Labs Read More »

Gartner names Sophos as a ‘Visionary’ in the first UEM Magic Quadrant

Sophos is proud to be positioned among the “Visionaries” in the 2018 Gartner Magic Quadrant for Unified Endpoint Management (UEM). Gartner states that: Unified endpoint management (UEM) tools combine the management of multiple endpoint types in a single console. UEM tools perform the following functions: Configure, manage and monitor iOS, Android, Windows 10 and macOS,

Gartner names Sophos as a ‘Visionary’ in the first UEM Magic Quadrant Read More »

The 5 W’s of Data Identification and Inventory

Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key questions to consider when identifying your organisation’s data, its importance and the level of protection required… I always figured that you would need to know what you have in order to protect it. However, I have seen far too many companies implement “best practices,”

The 5 W’s of Data Identification and Inventory Read More »

GlobalSign: How To Protect Your Start-Up From Ransomware

Cyber-attacks are making the lives of internet users very difficult. Ransomware in particular has been one of the most disruptive types of attack that hackers are using. Unfortunately, ransomware attacks are accelerating and intensifying with more victims each and everyday. Take the most recent example of WannaCry that took over the news at the end

GlobalSign: How To Protect Your Start-Up From Ransomware Read More »

CyberArk Labs: Breaking Down WannaCry Ransomware. What’s Different?

WannaCry malware continues to spread on a global basis and organizations are still at risk of being infected; Patching the Microsoft vulnerability can prevent infection via the SMB worm, but cannot prevent direct infection via phishing; CyberArk Labs tested prevention tactics on WannaCry over the weekend and found that the combination of enforcing least privilege

CyberArk Labs: Breaking Down WannaCry Ransomware. What’s Different? Read More »

GlobalSign: WannaCry Ransomware Sweeping the World. More Than 200,000 Computers Are Affected So Far

On Friday 12, May 2017, the internet got hit by a massive malware attack. This malware spread like wildfire around the world and more than 200,000 computers were affected over the weekend. This notorious malware is called WannaCry, a deadly “ransomware” which locks your computer and all the files become inaccessible and encrypted. Organizations and

GlobalSign: WannaCry Ransomware Sweeping the World. More Than 200,000 Computers Are Affected So Far Read More »