LinkedIn and Microsoft are bringing three new verification options to over 200 million LinkedIn users designed to help organizations be more confident that the people they are collaborating with are real and their work affiliations on their profiles are accurate. According to Microsoft, organizations can use Verified ID, part of the Microsoft Entra identity security […]
Latest Content
Gartner’s Top Cybersecurity Trends for 2023
Gartner's 2023 cybersecurity trends focus on human-centric security designs, people management and value creation.
Security and risk management (SRM) leaders must reassess their strategy when investing in technology and human-centric elements for their cybersecurity programs, according to analyst firm Gartner. According to Richard Addiscott, senior director analyst at Gartner, a human-centered approach to cybersecurity is essential, and must focus on people in control design. One in which, “focus[es] on […]
AVer Unveils A30 All-Purpose Camera
The AVer A30, all-in-one device, combines a camera, microphone and speaker in one device for small-to-medium-sized meeting environments.
AVer Information Inc. USA, Freemont, Calif.-based provider of video-collaboration solutions and education-technology solutions, announced the AVer A30 Camera. Per the company, its an all-in-one device combining a document camera, microphone and speaker. The A30 is thus a multi-functional tool that enhances collaboration and connectivity for hybrid-meeting environments. AVer states that it designed the A30 for […]
Is Your Organization Testing Against the Right Cyber Threats?
New research shows that organizations are testing against cyber threats in the headlines rather than attacks they're more likely to face.
Ransomware, supply chain attacks and nation-state threat actors have grabbed mainstream headlines in recent years, and organizations are largely recognizing that they must invest more in cybersecurity to defend against those emerging techniques. However, new research shows that some organizations are prioritizing defending against those trending, newsworthy threats at the expense of the threats actually […]
Microsoft Rolls Out Windows LAPS for On Prem, Cloud
Windows LAPS is now natively integrated into Windows and will be available for cloud and on-prem environments.
Microsoft is rolling out the new Windows Local Administrator Password Solution (LAPS) that is now natively integrated directly in Windows, eliminating the need for IT admins to download it as an MSI package from the Microsoft Download Center. The product has been available on the Download Center for man years and has been used to […]
April 2023 Patch Tuesday: CLFS Under Active Attack Again; 10-Year-Old Bug Reissued
IT administrators have a busy month with Microsoft alone releasing patches for 100 vulnerabilities, including one under active attack.
IT administrators in Microsoft environments have about 100 patches to apply for the April 2023 Patch Tuesday release, including one in Windows Common Log File System Driver that is being actively exploited and another one from 2013 that is being reissued. The company released patches to fix 97 vulnerabilities in its products, which was in […]
Utelogy Integrates with NETGEAR AV
Utelogy expands its Utelligence Program with NETGEAR AV Line Managed Switches, delivering benefits to end-users, integrators and MSPs.
Los Angeles, Calif.-based Utelogy, prominent in management, monitoring and analytics software for the connected workspace, announced the expansion of its Utelligence Program with support for NETGEAR AV Line Managed Switches. This strategic partnership will thus offer end-user customers, integrators, and Managed Service Providers (MSPs) a range of benefits. Through this partnership, Utelogy users can expect […]
Check Out CISA’s Updated Zero Trust Guidance
CISA's updated Zero Trust Maturity Model helps organizations strengthen their posture regardless of their starting point.
The U.S. Cybersecurity and Infrastructure Security Agency has released an updated version of its Zero Trust Maturity Model, which bolsters the agency’s zero trust standards with input from a public comment period. While designed for federal agencies, any organization can review the guidance and apply the protections to their infrastructure to help keep malicious actors […]
Business AI Adoption: Key Obstacles and Solutions for Success
Businesses often fail to meet expectations in the adoption of AI solutions. Learn strategies to ensure a successful AI implementation.
Artificial Intelligence (AI) is slowly encroaching on everyday life. Behind the scenes, AI already has a firm foothold in multiple business sectors, transforming operations and giving them a competitive edge. Early AI adopters are often tech enthusiasts, eager to leverage its competitive benefits. However, in their eagerness to embrace AI, they may overlook critical steps […]
7 Strategies for Improving Your Business’s Security in the Cloud
Complexity of the cloud can make it difficult to protect data. Here are seven strategies to Improve your business’s security in the cloud.
Editor’s note: This article was originally published on March 13, 2023 and has since been updated as of April 11, 2023. Cloud computing offers numerous advantages, including flexibility, cost-effectiveness, scalability, rapid deployment and storage capacity. Still, there are inherent cybersecurity risks with cloud infrastructure, including data breaches and leaks, compromised credentials, and human errors that […]