When printing got dangerous: A PrintNightmare

When printing got dangerous: A PrintNightmare

ESET offers product configuration tips to keep you safe from PrintNightmare exploits while retaining functional network printingPatches for Windows Print Spooler are out, yet problems seem to persist As news trickles out about the recent out-of-band security patch for...
How Zoom moved toward end-to-end encryption

How Zoom moved toward end-to-end encryption

Zoom’s presentation at RSA Conference 2021 focused on end-to-end encryption in Zoom Cloud Meetings. The company explained why its developers are focusing on the issue, how they plan to make calls more secure, and what other new, security-related features users can...
Fortinet and TAA Compliance: Exceeding Best Practices

Fortinet and TAA Compliance: Exceeding Best Practices

Like many companies that sell to the United States Federal government, Fortinet adheres to the rules related to the Trade Agreements Act (TAA). The TAA was enacted in 1979 to foster fair and open international trade, based on trade agreements between the United States...
Strategies and Use Cases for Private Cloud Security

Strategies and Use Cases for Private Cloud Security

When cloud migration originally started, some organizations often adopted public cloud services because the costs for operating, designing, and maintaining private cloud deployments seemed unsustainable. However, as cyber criminals increasingly target public cloud...