Vulnerability management company Tenable is creating a new research alliance program designed to share information prior to vulnerability disclosures and reduce the window of opportunity threat actors have to exploit newly disclosed vulnerabilities. According to the company, the Tenable Research Alliance Program allows security teams and system administrators to address attack paths and mitigate vulnerabilities […]
Latest Content
Report: IT Leaders Want to Consolidate UC&C Tools
IT leaders are now seeking more integrated collaboration solutions to remove complexity, according to new research from Masergy.
After nearly three years of deploying more and more collaboration solutions to help employees work remotely, IT leaders are now seeking more integrated collaboration solutions to remove complexity, according to new research from secure cloud networking company Masergy. The Comcast Business-owned firm’s study found that IT leaders are working to standardize and consolidate their corporate […]
October 2022 Patch Tuesday: 13 Critical, One Actively Exploited
Microsoft's October 2022 Patch Tuesday includes an actively exploited vulnerability in Windows COM+ Event System Service.
Microsoft has released fixes for 85 vulnerabilities as part of the October 2022 Patch Tuesday, including 15 that are rated critical and one listed as being exploited in the wild. However, the company still has yet to release patches for the two Exchange vulnerabilities that were reported as being actively exploited last week. Admins should […]
El Pollo Loco Chooses Navori Labs To Power Its Digital Menu Board Content
El Pollo Loco QSRs are able to update pricing and content on short notice with the help of Navori QL digital signage software solution.
Digital signage software company Navori Labs contributed to the QSR and fast casual community with a new enterprise-level deployment for El Pollo Loco, the fire-grilled chicken restaurant chain. El Pollo Loco has deployed Navori QL digital signage software to power digital menu board content inside 150 locations to date. The company can now efficiently update […]
CISO Burnout: Security Leaders are Working Nearly 17 Extra Hours Per Week
CISOs are working more than ever, and the extra hours, stress and fatigue are leading to increasing burnout, according to new Tessian study.
Chief information security officers (CISOs) are working more than ever, and the extra hours, stress and fatigue are leading to increasing rates of burnout, according to new research from email security company Tessian. The company’s research follows its inaugural CISO Lost Hours report last year that found CISOs were missing holidays, family vacations and other […]
Shure Achieves Zoom Rooms Hardware Certification for Flagship Products
Shure's MXA920 ceiling array microphone and IntelliMix Room Audio Processing software have received the Zoom Rooms Hardware Certification.
Niles, Ill.-based Shure has announced that the Microflex Advance MXA920 Ceiling Array Microphone and the IntelliMix Room Audio Processing Software have received Zoom Rooms Hardware Certification when paired with the Shure Microflex MXN5W-C Networked Loudspeaker. Ensuring Reliable, Consistent Sound The Zoom Rooms Hardware Certification is a key milestone for Shure in providing consistent, reliable sound […]
CompTIA: Tech Employment Continues Growth Trajectory
U.S. tech companies add workers for the 22nd straight month; tech unemployment rate falls to 2.1%, signaling tight labor market.
Technology-related employment continues to defy expectations of cutbacks, hiring freezes and layoffs, according to CompTIA’s latest tech jobs analysis. The Downers Grove, Ill.-based nonprofit association for the technology industry workforce reveals that tech sector companies added a net 4,800 workers, extending the job gains streak to 22 consecutive months. Year-to-date tech industry employment is tracking […]
Microsoft: IT Departments are in Insider Risk Crosshairs
IT professionals tasked with managing data and investigating breaches are the most associated with being at risk, Microsoft report finds.
As the amount of data being captured, copied and consumed in enterprises grows exponentially, organizations have had their hands full securing it from external attackers. However, organizations must also protect that data from insiders and preventing that data from leaving the organization and falling into the wrong hands. IT and security professionals are most often […]
Organizations in All Sectors Lack Tools and Teams to Address Cybersecurity Threats
Research from Blackberry shows organizations across all industries are struggling with maintaining and improving their overall cybersecurity posture.
The latest research from Blackberry, the Waterloo, Ontario-headquartered provider of security software and services, shows organizations across all industries are struggling with maintaining and improving their overall cybersecurity posture. However, extended detection and response (XDR) solutions may be able to help. The survey of 405 senior IT, networking and security decision-makers in the U.S., Canada […]
Microsoft Adds New Android Management Capabilities to Intune
Microsoft says it built a new way to manage devices running Android Open Source Platform in Microsoft Endpoint Manager.
Microsoft is releasing the ability to manage and protect corporate devices running on Android using Intune as part of Microsoft Endpoint Manager. According to Microsoft, Android devices are now mainstream and Android management is already offered by Endpoint Manager, but not all variations of the core Android Open Source Platform (AOSP) meet Google’s certification requirements […]