What We Are Reading
Article Cybersecurity

Google Issues Critical Update For Millions Of Pixel Users

Google again trails Samsung this month, with details of its June security update only just out. Unlike Samsung, though, this month’s Pixel update includes multiple critical updates, and a fix for a high-severity vulnerability Google says “may be under limited, targeted exploitation.” View this as an update now warning for millions of users.

Article Cybersecurity

Pax8 offers MSPs a leg-up into cyber security

Cloud commerce marketplace provider Pax8 is offering resources and tools to help partners establish their own cyber security practices. Based on the CIS Control Framework, from the Centre for Internet Security,

Article Cybersecurity

16 DevSecOps Trends Shaping The Future Of Software And Cybersecurity

AI-Driven Security Is Automating Threat Detection And Response One trend in DevSecOps is the integration of AI-driven security, which will significantly enhance both software ... data. Dynamic, fine-grained access can help minimize such risk.

Article Cybersecurity

Cyber Lingo: What is pretexting in cyber security?

Pretexting in cyber security is commonly used but not widely known. When employees don’t know what pretexting is – or how convincing it can be – it makes them more vulnerable to the tricks of a cyber criminal.

Article Cybersecurity

The Serious Risks Of IT Sprawl And How To Solve Through Simplification

Solving IT sprawl is a critical step toward creating a secure, efficient and scalable foundation critical for success today.

Article Cybersecurity

Bridging the gap between legacy tools and modern threats: Securing the cloud today

However, the swift adoption of cloud infrastructure has also introduced expanded enterprise attacks, the rate at which is often outpacing security precautions. According to the Unit 42 Incident Response Report,

Blogs
Blog Cybersecurity

Cloud Based Firewall -- Is It Right for Your Network Security?

Cloud-based firewalls are cloud-deployed “virtual” network devices. Recently emerging as a new software-based technology, cloud firewalls are built to fulfil the same purpose, namely the prevention of unauthorized access to…

Blog Cybersecurity

Importance of Security Operations Centre in Cyber Security

Cyber security threats are becoming more and more challenging to detect and mitigate and even more common and dangerous in their types. According to a research study on the Cost…