Year: 2023
Sophos Firewall v20: VPN Enhancements
NIST CSF (Cybersecurity Framework) 2.0 is just around the corner
Sophos Firewall v20: Streamlined Management
Tech-Forward Strategies to Effectively Fight Fraud

By Blair Cohen, Founder and President, AuthenticID Not only has digital transformation completely reshaped the way we conduct business, but it has also introduced an onslaught of fraudulent attacks on […]
The post Tech-Forward Strategies to Effectively Fight Fraud appeared first on Cyber Defense Magazine.
Top Cybersecurity Questions of the Year: What Everyone Wants to Know
Sophos ZTNA on Sophos Firewall is now available
Why You Should Prioritize Your Privacy Policies

By Jason M. Schwent, Senior Counsel, Clark Hill The enactment of the California Online Privacy Protection Act of 2003 created a need for commercial websites in the United States to […]
The post Why You Should Prioritize Your Privacy Policies appeared first on Cyber Defense Magazine.
GraphRunner Activity Detection: Hackers Apply a Post-Exploitation Toolset to Abuse Microsoft 365 Default Configurations

Microsoft 365 (M365) is leveraged by over a million global companies, which can pose severe threats to the customers relying on this popular software in case of compromise. Since it possesses a set of default configurations, adversaries can set their eyes on them and exploit the latter exposing affected users to significant security risks, which […]
The post GraphRunner Activity Detection: Hackers Apply a Post-Exploitation Toolset to Abuse Microsoft 365 Default Configurations appeared first on SOC Prime.
EPA Won’t Force Water Utilities to Audit Their Cybersecurity
The industry pushed back: Despite the EPA’s willingness to provide training and technical support to help states and public water system organizations implement cybersecurity surveys, the move garnered opposition from both GOP state attorneys and trade groups. Republican state attorneys that were against the new proposed policies said that the call for new inspections could … Read more