Our Blog

Home / Blog

Vendor Workspace, Don’t Leave Home Without It

Vendor Workspace, Don’t Leave Home Without It

So, you’re in negotiations with Microsoft for a renewal and have investments across on-premises applications, Microsoft O365 and Azure—how do you leverage your current customer acumen in tandem with deep product knowledge to avoid ending up with an uncomfortable...

JSON Web Token attacks and vulnerabilities

JSON Web Token attacks and vulnerabilities

JSON Web Tokens (JWTs) provide a way to securely exchange data using JSON objects. They are often used in authorization because they can be signed, verified, and therefore trusted – but only if implemented correctly. Here is a technical deep dive into JSON Web Token...

Infographic: Securing Devices with MetaDefender Drive

Infographic: Securing Devices with MetaDefender Drive

The COVID-19 pandemic created new challenges and cyber risks for businesses across many industries. The transition to working from home - and now back to the office - have created a wide range of cyber attack vectors through personal and unauthorized devices. Data...

Microsoft signed a malicious Netfilter rootkit

Microsoft signed a malicious Netfilter rootkit

What started as a false positive alert for a Microsoft signed file turns out to be a WFP application layer enforcement callout driver that redirects traffic to a Chinese IP. How did this happen? Last week our alert system notified us of a possible false positive...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo