Our Blog
Home / Blog
The Need for a Zero Trust Edge Strategy
By John Maddison | February 14, 2022 Today’s hybrid workers require access to distributed applications deployed in the datacenter, multi-cloud environments, and SaaS locations. Digital acceleration involves adopting and implementing new technologies and practices to...
Lurk: an exemplary Cybercrime Inc.
Ruslan SabitovFebruary 14, 2022 What researchers remember most about the Lurk group. The trial of the creators of the Lurk banking Trojan is finally over. They are stop as a result of an unprecedented joint operation between a multitude of authorities and the aid of...
Kubernetes just got easier with Flexera
Kubernetes just got easier with Flexera . As noted the last time we discussed containers, specifically Kubernetes, they pose a significant challenge for IT. You can easily lose sight of applications in containers, including whether or not you’re license compliant....
Facing DevSecOps hurdles, federal agencies need a modern approach to security
Facing DevSecOps hurdles, federal agencies need a modern approach to security . Increased threats mean the government can’t sleep on cybersecurity. Learn how federal agencies can improve their security posture without sacrificing innovation.Your Information will be...
Merck wins Not Petya claim – but the future of cybersecurity insurance is complicated
Merck wins Not Petya claim – but the future of cybersecurity insurance is complicate . Pharmaceutical company Merck & Co won its case for coverage of losses incurred during the Not Petya cyberattack, securing a payment of 1.4 billion US-Dollars from its insurance...