By James R. Slaby, Acronis Director of Cyber Protection With recent attacks against government offices like Baltimore, MD and the crippling of A2 Hosting’s servers, the scourge of ransomware continues to dominate the headlines about cybercrime. Recognizing that threat doesn’t require an IT background – stories abound regarding the destruction that the online threat causes… Read More Why Is Ransomware Still the Top Cybercrime? A Former FBI Counter-Intelligence Operative Will Explain
Intercept X Advanced for Server with EDR now launched! Bringing the power of Endpoint Detection and Response (EDR) to Intercept X for Server. Unmatched Server Protection Sophos Intercept X for Server secures cloud, on-premises, or hybrid server environments from the latest malware threats, gives unparalleled visibility into the organization’s estate and allows them control exactly… Read More Sophos Intercept X Advanced for Server with EDR- NOW AVAILABLE!
Threat hunting has become a bit of a buzzword within the information security industry and depending on who you ask, you’re likely to get a different response from person-to-person. There is no industry standard for what a threat hunting process looks like, but there are a few characteristics present in most descriptions of the process.… Read More Threat Hunting with Extrahop Reveal(x)
Imperva provides market-leading protection seamlessly across environments and infrastructures—delivering best-in-class cybersecurity solutions on premise, in the cloud, and across hybrid environments. Once deployed, Imperva’s solutions proactively identify, evaluate, and eliminate current and emerging threats to secure your data/ applications. Imperva app security and data security provide actionable insights that matter, so you have clarity for… Read More Imperva is Championing the Fight to Secure Data and Applications Wherever They Reside
Thycotic Findings Show 21 Percent Already Planning or Using PAM in the Cloud; Another 26 Percent Exploring Migration to Cloud-Based PAM Thycotic, a provider of privileged access management (PAM) solutions to 10,000 organizations worldwide, today released the findings from its 2019 RSA Conference survey. More than 200 security professionals were surveyed at the 2019 RSA… Read More 2019 RSA Conference Survey Finds Companies Moving to Cloud-Based PAM Solutions
Leverage Lifeboat for the newly launched Sophos Partner Enablement Program! To request information or connect with the Lifeboat team- CLICK HERE! View the Full Sophos Partner Enablement Program Flyer here!
With the release of Sophos Cloud Optix just being launched TODAY- the press coverage has been pouring in! What is Sophos Cloud Optix? Sophos Cloud Optix is an AI-powered, next generation cloud infrastructure security platform. It delivers continuous security monitoring, compliance, analytics, and remediation across multiple public cloud accounts and multiple public cloud platforms(Amazon Web… Read More Sophos Cloud Optix- Now Launched!
Just like daylight savings is a good time to change your smoke alarm batteries, National Consumer Protection Week is an even better time to make sure your customers are aware of their rights around security and the protection available to them. Security breaches, hackers, scams, and identity theft can lurk in ALL verticals of business,… Read More National Consumer Protection Week and How to Help
Customers Benefit From Enterprise Workflow Support, Advanced Session Recording and Improved Multi-Factor Authentication Options with the YubiKey Thycotic a provider of privileged access management (PAM) solutions to 10,000 organizations worldwide, today announced Secret Server 10.6, which includes enhancements to its Secret Server solution that increases accountability and agility in dynamic enterprise environments. Secret Server 10.6… Read More Thycotic Delivers Powerful Capabilities to Protect Privileged Accounts in Large, Diverse Enterprises
Just when you thought you had all of your defenses in place when fighting Malware, Cyber Attacks, and Ransomware… think again! Cybercriminals are busy crafting new methods of attacks that are ready to take your data for prey and pounce on your personal information. Here are 10 new sneaky attacks to be on the look-out… Read More 10 New malware attacks to be on the lookout for in 2019- and what you can do to protect your data!