dcsimg

MOVEit 2019 is here!

A new version of MOVEit will be released on March 19th, 2019 called MOVEit 2019. The new version includes a number of enhancements designed to improve usability and provide more security and scalability options including: Live View Dynamic Links for one-click access to detailed file transfer informationGranular Secure Folder Sharing Permissions for more control over … [Read more...]

How to Get Your To-Do List Done When You’re Always in Meetings

Each morning, you emphatically write at the top of your to-do list, “Work on presentation!” Perhaps you even underline it a time or two for emphasis. But at the end of the day, your resolve has turned to dismay: yet again, you spent most of your time in meetings. And when you had a bit of time between them, you didn’t make any progress on your presentation. Read more here Source: hbr.org … [Read more...]

WinRAR Absolute Path Traversal Vulnerability Leads to Remote Code Execution

On February 20, researchers at Check Point Research (CPR) published a blog detailing their discovery of multiple vulnerabilities within a library used by WinRAR, a popular file compression tool, to extract ACE archives. When exploited, these vulnerabilities can lead to remote code execution. An exploit script was published to Github one day after CPR’s blog post. The 360 Threat Intelligence Center … [Read more...]

Facing Your Mid-Career Crisis

About eight years ago I found myself living a cliché. A tenured philosophy professor at a respected university, I had the career of my dreams. I had made it through graduate school, the arduous climb of publish or perish, and the stress of seeking tenure and promotion. I had a wife, a child, and a mortgage. I was doing what I loved, and yet the prospect of doing more of it, week after week, year … [Read more...]

Nine out of Ten companies that take Lepide’s risk assessment find critical flaws in their data security!

Lepide's professional risk-assessment service is helping enterprises all over the world determine where their areas of weakness are to help them reduce the risks of data breaches. Learn more about Lepide here Schedule your risk assessment here … [Read more...]

Research: When Small Teams Are Better Than Big Ones

The “discovery of the 21st century” was awarded the Nobel prize two years after it was made. In 2015, the Laser Interferometre Gravitational-Wave Observatory (LIGO) project finally detected what it was built to: gravitational waves—ripples in the fabric of space and time—caused by the collision of two black holes. Read more here Source hbr.org … [Read more...]

Webinar:”How to Start Your Least Privilege Cyber Security Journey”

From the basics to discovering actionable steps to planning your least privilege cyber security strategy, don't miss our upcoming "How to Start Your Least Privilege Cyber Security Journey" webinar on Thursday, February 28th. Register now: http://bit.ly/2Ik4YY3 Learn more about Thycotic Secret Server here … [Read more...]

How to Figure Out How Much Influence You Have at Work?

A banker in Southeast Asia wanted to allow employees of a car rental agency to buy used cars from the employer. But not a single business unit was able to put together that product. Different units were stopped either by the existing product portfolio, the underlying risk, or regulatory guidelines. One of the banker’s colleagues, however, was able to facilitate valuable introductions across the … [Read more...]

TOP 5 Least Privilege Reports CISOS Live for

Get ready. These least privilege security reports will help you demonstrate how successful your program is to lowering risk and providing value. Read more here Learn more about Thycotic Secret Server here … [Read more...]

13 Ways We Justify, Rationalize, or Ignore Negative Feedback

Everybody loves feedback . . . as long as it’s positive. But most of us dislike negative feedback so much that we’ve even changed the name — it’s not negative, it’s constructive. Still, it’s an irreplaceably valuable gift. Read more here Source: hbr.org … [Read more...]