Vendor Workspace, Don’t Leave Home Without It

Vendor Workspace, Don’t Leave Home Without It

So, you’re in negotiations with Microsoft for a renewal and have investments across on-premises applications, Microsoft O365 and Azure—how do you leverage your current customer acumen in tandem with deep product knowledge to avoid ending up with an uncomfortable...
JSON Web Token attacks and vulnerabilities

JSON Web Token attacks and vulnerabilities

JSON Web Tokens (JWTs) provide a way to securely exchange data using JSON objects. They are often used in authorization because they can be signed, verified, and therefore trusted – but only if implemented correctly. Here is a technical deep dive into JSON Web Token...
Infographic: Securing Devices with MetaDefender Drive

Infographic: Securing Devices with MetaDefender Drive

The COVID-19 pandemic created new challenges and cyber risks for businesses across many industries. The transition to working from home – and now back to the office – have created a wide range of cyber attack vectors through personal and unauthorized...
Microsoft signed a malicious Netfilter rootkit

Microsoft signed a malicious Netfilter rootkit

What started as a false positive alert for a Microsoft signed file turns out to be a WFP application layer enforcement callout driver that redirects traffic to a Chinese IP. How did this happen? Last week our alert system notified us of a possible false positive...
IT Management in the Healthcare Sector

IT Management in the Healthcare Sector

Outstanding service quality begins with satisfied employees. In the healthcare sector in particular, employees who feel good about themselves are enormously important, because patient well-being greatly depends on the good work that the staff provides. With the right...