dcsimg

4 Predictions for Managed File Transfer 2021

Multiple integrations, migration to cloud & mobile, BizOps, focus on security & encryption – these are just some of the priorities in file sharing for 2021. … [Read more...]

DNSpooq bugs haunt dnsmasq

The research team at JSOF found seven vulnerabilities in dnsmasq and have dubbed them DNSpooq, collectively. Now, some of you may shrug and move on, probably because you haven’t heard of dnsmasq before. Well, before you go, you should know that dnsmasq is used in a wide variety of phones, routers, and other network devices, besides some Linux distributions like Red-Hat. And that’s just a … [Read more...]

What the Head Nerds Were Up to in 2020

Being a part of an MSP is challenging. As an owner, you have to wear multiple hats and make decisions in areas where you may not be an expert. Likewise, technicians can be stretched thin doing varied work while their colleagues in-house can specialize on a specific technology or process.  Read More … [Read more...]

Daisy Chaining: How Vulnerabilities Can Be Greater Than the Sum of Their Parts

With the rise of daisy-chained cyberattacks, security teams must consider the contextual risk of each vulnerability, including its potential to be leveraged in a full system compromise. Faced with limited time and resources, every security team must prioritize threats. Vulnerabilities that are rated lower in severity might be tabled to fix later; however, with the explosion of critical … [Read more...]

What are Azure Log Analytics and Azure Monitor

A deep dive into what Azure Monitor and Azure Log Analytics have to offer, how to onboard on Azure Monitor, and what’s new. Read the post here: What are Azure Log Analytics and Azure Monitor … [Read more...]

Thycotic Recognized as a 2021 Gartner Peer Insights Customers’ Choice for Privileged

Washington, DC., January 21, 2021 – Thycotic, a provider of privileged access management (PAM) solutions to more than 12,500 organizations worldwide, including 25 of the Fortune 100, today announced that it was named a Customers’ Choice in the January 2021 Gartner Peer Insights ‘Voice of the Customer’ for Privileged Access Management report in the Large Enterprise, Finance, and North … [Read more...]

Thycotic Named a 2021 Gartner Peer Insights Customers’ Choice for Privileged Access Management for Large Enterprise, Finance, and North America

The Thycotic team is excited to announce that we have been recognized as a Customers’ Choice in the January 2021 Gartner Peer Insights ‘Voice of the Customer’: Privileged Access Management Markets Large Enterprise, Finance, and North America. Our team at Thycotic takes great pride in this distinction, as customer feedback continues to shape our products and services. The Gartner Peer Insights … [Read more...]

Oracle January 2021 Critical Patch Update Includes Fixes for Five Critical WebLogic Flaws (CVE-2021-2109)

Oracle’s first Critical Patch Update of 2021 addressed 329 security updates across 25 product families, including five new critical flaws in Oracle WebLogic Server. Background On January 19, Oracle released the Critical Patch Update (CPU) for January 2021, its first quarterly release for the year. This quarterly update contains fixes for 202 CVEs in 329 security updates across 25 Oracle product … [Read more...]

Ready to Test Your Hacking Skills? Join Tenable’s First CTF Competition!

Tenable launches new Capture the Flag event for the security community, running from February 18–22. Capture the Flag events are a tried and true way of testing your cybersecurity skills, practicing new ones and seeing how you measure up against others in the industry. At Tenable, we wanted to put on a CTF specifically for our community. We’re proud to announce the first Tenable Capture the Flag … [Read more...]

Zoom watermarking: pros and cons

Metadata, which gives background information on pieces of data, is typically hidden. It becomes a problem when accidentally revealed. Often tied to photography mishaps, it can be timestamps. It might be location. In some cases, it can be log analysis. Many tutorials exist to strip this information out. This is because it can reveal more than intended when it hits the public domain. Default … [Read more...]