dcsimg

5G Wireless Service, GDPR Laying the Groundwork for 2019

It’s hard to distill the biggest mobile stories of the year, mostly because mobile technology has matured to the point where changes are tending toward evolutionary rather than revolutionary. That may change in the year ahead, as two of the biggest stories of 2018 will likely be bigger in 2019. Specifically, we saw the first U.S. cities get 5G wireless service from major carriers, with more … [Read more...]

SolarWinds adds SDN monitoring support to network management portfolio

SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. Designed to address the increasing adoption of SDN technology—Cisco ACI in particular—SolarWinds Network Performance Monitor helps customers monitor logical components of their SDN environment, including APICs, tenants, application profiles, endpoint groups, and physical … [Read more...]

Stopping Data Breaches Will Require Help from Governments

Not a month goes by without a major corporation suffering a cyber attack.  Often state-sponsored, these breaches are insidious, difficult to detect, and may implicate personal information relating to millions of individuals. Clearly, the current approaches to safeguarding sensitive data are insufficient. We need to reorient expectations for the role of the private sector in cybersecurity.  As … [Read more...]

A Brief Introduction to the Nessus Vulnerability Scanner

Nessus is one of the many vulnerability scanners used during vulnerability assessments and penetration testing engagements, including malicious attacks. This article will focus on this vulnerability scanner, discussing the fundamentals that one needs to have before getting started with the tool, the different scanning capabilities that it provides, what it takes to run the tool and how results … [Read more...]

“Testing, testing, 1,2,3 …”

New Year’s resolutions take many forms. From regular exercise, to less screen time, to better habits in your IT work life, there is no shortage of advice. In the category of better IT habits is that old chestnut about testing backups. Everyone knows they should do it, and many write about it. But how many actually do it? Until you test your backups, in theory, they are both corrupted and … [Read more...]

Altaro wins two US Technology Elite Awards

Altaro, fast-growing developer of easy-to-use backup solutions, has won two 2018 US Technology Elite Awards, US Business News has announced. Altaro was named Best Cloud Backup Solutions Company 2018 and its product Altaro VM Backup won the Best Virtual Environments Recovery Solution award. Through the 2018 US Technology Elite Awards, US Business News aims to highlight industry leaders from … [Read more...]

Learn the Benefits and Drawbacks of Edge Computing

This exciting technology can extend compute power to places and scenarios previously considered unimaginable – but it carries some very real risks. Edge computing can cover anything from a tiny single board system to a rack of mountable appliances. Put simply, all the data collection occurs locally and the useful, aggregated valuable data is then uploaded to the cloud for further computation or … [Read more...]

Thycotic named a visionary in 2018 Gartner Magic Quadrant for Privileged Access Management

Thycotic, provider of privileged account management (PAM) solutions for more than 10 000 organisations worldwide, today announced it has been named a visionary by Gartner in its December 2018 Magic Quadrant for Privileged Access Management.Gartner recently published its top 10 security projects for 2018, with PAM listed as number one. PAM security provides a more inclusive picture of security … [Read more...]

Stopping Data Breaches Will Require Help from Governments

Not a month goes by without a major corporation suffering a cyber attack.  Often state-sponsored, these breaches are insidious, difficult to detect, and may implicate personal information relating to millions of individuals. Clearly, the current approaches to safeguarding sensitive data are insufficient. We need to reorient expectations for the role of the private sector in cybersecurity.  As … [Read more...]

Malwarebytes helps take down massive ad fraud botnets

On November 27, the US Department of Justice announced the indictment of eight individuals involved in a major ad fraud case that cost digital advertisers millions of dollars. The operation, dubbed 3ve, was the combination of the Boaxxe and Kovter botnets, which the FBI—in collaboration with researchers in the private sector, including one of our own at Malwarebytes—was able to … [Read more...]