SD-WANs and Multi-Cloud Security for MSSPs: Fortinet Explains Partner OpportunitiesJoe PanettieriSeptember 13, 2021
Video Podcast: Fortinet SOAR Advice and Guidance for MSSPs and Security Minded MSPsJoe PanettieriJanuary 14, 2020
Security Program Controls/TechnologiesCymulate Unveils Continuous Threat Exposure Management (CTEM) SolutionDan KobialkaJune 20, 2023"Cymulate has always taken an attacker's view on cybersecurity defense."
Generative AIeSentire Launches Generative AI Cybersecurity ModelDan KobialkaJune 20, 2023"Advances in generative AI now allow the embedded intelligence of our best security experts."
XDRXDR Partnership: CTI Group Subsidiary Joins Forces with Stellar CyberDan KobialkaJune 20, 2023"The Stellar Cyber Open XDR platform enables integrated and automated security management, making it easier for companies to ensure data security."
BreachBarracuda ESG Devices Exploited by Suspected China-backed Cyber OperativesD. Howard KassJune 20, 2023Mandiant describes the attack as “broadest cyber espionage campaign conducted by a China-nexus threat actor” since the Microsoft hack that compromised thousands of computers.
ContentCyberattackers Got More Creative Post-Pandemic, Proofpoint Study FindsD. Howard KassJune 20, 2023“As security controls have slowly improved, threat actors have innovated and scaled their bypasses."
RansomwareRussian Cl0p Operatives Hit U.S. Federal Agencies in Widespread CyberattackD. Howard KassJune 16, 2023“If this was one of the Cl0p affiliates, it is a very brazen move as it is likely to draw some serious attention from the federal government."
Channel partner programsClaroty, Siemens Healthineers Strike Deal for Healthcare Managed Security Services and SoftwareD. Howard KassJune 16, 2023The agreement will combine Healthineers managed services and software with Claroty’s medical device security data.
ContentNearly 40% of Senior Security Execs “Trust” Their Cyber Defenses But Number of Incidents, Tools Shows OtherwiseD. Howard KassJune 16, 2023“There is a frequent overestimation in the capabilities of security tools without continued managed response."