Talking about ROI with every security solution is always tough. Why? Because we need to talk about what issues could befall us if we decide not to implement the given product. We have to talk about the loss. This can include real financial loss caused by criminals and problems which are intangible  – like brand […]

Read more

#cyberattacks DOD weapons password hacked. Wanna know more about it? Read more here. Third party Pentagon provider breached, over 30,000 victims at DoD travel provider. #healthcare Federal regulators have smacked health insurer Anthem Inc. with a record $16 million HIPAA settlement in the wake of a cyberattack revealed in 2015, which impacted nearly 79 million individuals. […]

Read more

This is an update to our first 3.8-43709 release, focused on stability and performance. Fudo 3.8-48156 LTS contains many fixes and improvements, to name a few most important: RDP connections: we have fixed random disconnections problem LDAP/AD synchronisation Live session access via web borwser Cluster stability UI responsiveness with large number of objects Multiple Active […]

Read more

SMBs are struggling to cope with cybersecurity. They face challenges including: a lack of training and no support from management. High time to change this! Find out more here. The UK’s NCSC releases its annual review about cybersecurity and the threat landscape. Click here to read more. Insider threats at NASA. An ex contractor found […]

Read more

Despite all that’s covered in the media, many people still don’t realize the threat that often stems from the inside. Take heed from an inside job at the Iowa state lottery and don’t let your organization fall prey to such an attack. Read more here. Healthcare remains vulnerable in the US and globally, but the […]

Read more

Some say, that both agent and agentless approach in IT security has its own advantages and disadvantages. In general, agents as small pieces of software are often seen as efficient and reliable way of gathering lots of data from a system they are installed on while agentless approach relies on industry standards to provide information […]

Read more

Insiders are responsbile for some of the most common threats within a company. This week saw a former NSA employee sentenced for taking home classified documents. Click here. With the transition to a digital environment in healthcare, outdated legacy systems remain a hurdle which can cause damage and endanger patient safety. Read more here. Security is […]

Read more