Cybersecurity News Headlines Update on September 25, 2020

CISA: Federal Agency Hacked, Data Exfiltrated. The US Cybersecurity and Infrastructure Security Agency (CISA) has published an analysis report detailing a cyberattack against a federal agency’s enterprise network. The threat actor gained access to the unnamed agency’s system and exfiltrated data. The report provides information about the methods used to gain access to the network. […]

Kubernetes Security Tips, Tricks, and Best Practices

The rapid adoption of Kubernetes to manage containerized workloads is driving great efficiencies in application development, deployment, and scalability. However, when security becomes an afterthought, you risk diminishing the greatest gain of containerization – agility. Read on this article to learn how to: Build secure images and prevent untrusted/vulnerable code. Configure RBAC, network policies, and […]

Effectively Manage and Protect Your Endpoints using Unified Endpoint Management (UEM) Solution

How can you effectively manage your growing fleet of endpoints and devices while successfully avoiding attacks? Limiting users isn’t the best answer. People expect to access the tools and resources they need, when they need them, and on the devices of their choice. But, as the number of endpoints increase, so do attacks. You need […]

Best Practices for Effective Linux Security Management

Not only Windows and Mac, but even Linux systems can also fall victim to cyberattacks. This article helps IT sysadmins improve their existing Linux security procedures. Securing endpoints can an overwhelming routine for system administrators, especially when they’re remote. Considering much of the world is now working remotely and may continue to do so in […]

Cybersecurity News Headlines Update on September 18, 2020

US Department of the Interior OIG Audit Report Details Wireless Network Security Problems. According to an audit report from the Department of the Interior Office of Inspector General (DOIOIG), “the Department did not deploy and operate secure wireless network infrastructure, as required by the National Institute of Standards and Technology (NIST) guidance and industry best […]

Threat & Attack Surface Intelligence (ASI): See What Adversaries See and Stop Them in KNOW Time

Your IT and Security teams watch your network and web site 24/7. You invest thousands (conservatively) in firewalls, SIEMs, anti-malware, Intrusion Prevention/ Detection Systems (IPS/IDS), and other security tools that bombard you with alerts all day long. Yet attacks can still take you by surprise. In one recent example, the veteran hacktivist group Anonymous resurfaced […]