dcsimg

New Women in CyberSecurity (WiCyS) veterans program aims to bridge skills gap, diversify sector

The cybersecurity industry has a problem: We have zero unemployment rate. Or so we’re told. With experts predicting millions of job openings in the years to come—coupled with the industry’s projected growth of US$289.9 billion by 2026 and soaring cyberattacks against businesses—now is as good a time as any for organizations to face the problem of the alleged skills shortage and take … [Read more...]

5 tips for building an effective security operations center (SOC)

Security is more than just tools and processes. It is also the people that develop and operate security systems. Creating systems in which security professionals can work efficiently and effectively with current technologies is key to keeping your data and networks secure. Many enterprise organizations understand this need and are attempting to meet it with the creation of their own security … [Read more...]

The Lepide Guide for Managing and Monitoring Access Control

The ability to determine who should and shouldn’t have access to what data, is an integral part of any data security strategy, or at least it should be. Unfortunately, many organizations still don’t have the control that they need to keep their data secure. Many don’t have a complete inventory of what data they store, let alone a clear understanding of how that data is being … [Read more...]

Setting Up A Persistent SSH Tunnel

Adversaries can utilize MITM attacks to steal credentials, even when they are protected by SSL. … [Read more...]

Threat spotlight: The curious case of Ryuk ransomware

Ryuk. A name once unique to a fictional character in a popular Japanese comic book and cartoon series is now a name that appears in several rosters of the nastiest ransomware to ever grace the wild web. For an incredibly young strain—only 15 months old—Ryuk ransomware gaining such notoriety is quite a feat to achieve. Unless the threat actors behind its campaigns call it quits, too—Remember … [Read more...]

CVE-2019-0604: Critical Microsoft SharePoint Remote Code Execution Flaw Actively Exploited

The SharePoint flaw first exploited in the wild in May continues to be exploited nine months after it was patched by Microsoft. Background On December 10, security researcher Kevin Beaumont published a tweet cautioning organizations to patch a Microsoft SharePoint flaw that’s been actively exploited in the wild since at least May, and has since remained a valuable asset to cybercriminals. A … [Read more...]

3 Ways to Say Goodbye to a Problem Customer

<p>For many entrepreneurs, having the laser focus to identify a customer that is not a good fit for their business model is not always on their list of priorities.&nbsp;However, the most profitable MSPs know who their ideal customer is and steer clear of those that aren’t. Read More … [Read more...]

Thycotic’s Cyber Security Predictions and Trends for 2020

Which cyber security predictions or trends do you think will become reality? 2019 has been an exciting and interesting year for those of us with an interest in cyber security.  The topic is top of mind for governments and business leaders around the world as they wrestle with the ever-evolving challenge of reducing cyber-attack risks. It’s become more apparent to us how AI (Artificial … [Read more...]

Thycotic Enhances Privileged Access Protection for macOS Workstations and Laptops

WASHINGTON, D.C., Dec. 12, 2019 — Thycotic, provider of privileged access management (PAM) solutions to more than 10,000 organizations, including 25 of the Fortune 100, today revealed new capabilities that help implement the principle of least privilege security for workstations and laptops running macOS. The new release of Thycotic’s Privilege Manager solution supports both Windows and … [Read more...]

Can Windows Server Standard Really Only Run 2 Hyper-V VMs?

A misunderstanding of licensing terminology and a lot of tribal knowledge has led many to believe in a limitation with standard edition - let's clear it up Read the post here: Can Windows Server Standard Really Only Run 2 Hyper-V VMs? … [Read more...]