March 7, 2023
Everyone loves a good heist movie, which is why Hollywood keeps bringing out new ones. The Ocean’s Eleven series, the Italian Job, Die Hard, the Fast, and the Furious series – the list goes on and on. Yet the story...
March 2, 2023
The profile of Common Vulnerabilities & Exposures (CVEs) has risen in recent years. Organizations now pay far more attention to them than they used to. Of course, there are still plenty of cases on record of companies getting hacked due...
February 28, 2023
NEWPORT BEACH, Calif. – February 28, 2023 – Syxsense, a global leader in Unified Security and Endpoint Management (USEM) solutions, today announced the addition of Mary Yang as Chief Marketing Officer (CMO). Yang is an experienced marketing executive that most...
February 27, 2023
Windows users are notorious for holding onto aging operating systems and PCs many years after their sell-by date. A couple of years back, for example, an entire publishing and events office was discovered to still be running on Windows XP....
February 24, 2023
Is February's Spotlight session, Syxsense Senior Solutions Architect Graham Brooks spoke on how to craft a flexible and dynamic endpoint compliance management framework for Zero Trust and Continuous Compliance using Syxsense Enterprise.
February 23, 2023
A recent survey by Foundry Research highlighted the fact that little has changed in the cybersecurity world of late. Organizations remain deeply worried about their inability to spot threats, respond to them in a timely manner, and train staff to...
February 21, 2023
A new study examined Security Service Edge (SSE) adoption, and the role it plays in establishing a zero-trust architecture. According to the report, SSE’s popularity is reflected in the fact that 71% of cybersecurity professionals are familiar with it, despite...
February 16, 2023
Software-as-a-Service (SaaS) is very much in demand, according to a new survey. This is good news for vendors offering SaaS services as well as MSPs who are grabbing a steadily larger slice of the expanding as-a-Service pie. The report reveals...
February 14, 2023
Historically, successful attack strategies continue until adequate defenses are assembled. For example, the Mongol hordes ravaged Asia and Eastern Europe for centuries. A simple invention – the walled town – ended their ability to ride in from the wilderness and...
February 9, 2023
Phishing remains one of the most popular avenues of attack by cybercriminals. Yes, zero-day exploits sometimes help them to strike gold. But the bread-and-butter front-line troops of cybercriminal gangs are phish-ers of men and women. It is rumored that in...