New Cyber Defense Brand DeepSeas to Unite Newly Acquired Commercial Managed Threat Services Business from Booz Allen Hamilton with Security On-Demand. Learn More

Threat Advisory: Apple Zero-Day Vulnerabilities

Threat Advisory: Apple Zero-Day Vulnerabilities

(CVE-2022-32894 and CVE-2022-32893) Event Summary Apple is urging macOS, iPhone and iPad users to install the released update as soon as possible. The update includes fixes for two zero-days vulnerabilities under active attack. The patches

Read More
Threat Advisory: F5 Reports High Severity Vulnerabilities in Multiple Products

Threat Advisory: F5 Reports High Severity Vulnerabilities in Multiple Products

Threat Advisory: F5 Reports High Severity Vulnerabilities in Multiple Products Event Summary Multiple product vulnerabilities were reported by F5, including high, medium, and low severity risk weaknesses, involving multiple conditions that could lead an attacker

Read More
Zero Access Trust-The Vulnerability of Trust

Zero Access Trust-The Vulnerability of Trust

Zero Access Trust – The Vulnerability of Trust The year 2020 came to a close with the devastating SolarWinds Supply chain breach, affecting 18,000 of SolarWind’s customers. These attacks affected critical infrastructure, government entities and

Read More
False Positive vs False Negative Alerts in Cyber Security

False Positive vs False Negative Alerts in Cyber Security

False Positive vs False Negative Alerts in Cyber Security We asked our LinkedIn audience in a recent survey, what MDR capabilities matter most? Over half said that false positive reduction was at the top of

Read More
The Data Problem in Cyber Security

The Data Problem in Cyber Security

The amount of data that your organization produces is massive. In addition, the amount of data is increasing exponentially, which makes traditional threat detection in today's complex IT environment difficult. The primary issue is that

Read More
What are the Generational Differences in Threat Detection Solutions?

What are the Generational Differences in Threat Detection Solutions?

Cyber security experts often use a generational model to describe the evolution of threat detection. To determine which generation is right for your company and offers the most value, you'll want to familiarize yourself with

Read More
PREV NEXT

Latest News

Subscribe

Keep up to date on our new services and technologies here.