| Sep 29, 2020 What Software Companies looking to develop for the Healthcare Industry need to know Many software companies looking to develop for the healthcare industry are unaware they must be HIPAA compliant. Learn more.
| Sep 28, 2020 Cisco Aironet APs vulnerability risks DoS This threat report is about a vulnerability recently discovered in Cisco Aironet Access Points (APs) known as CVE-2020-3560.
| Sep 24, 2020 Zero Trust Beyond VPN Replacement: Earning the Most Value for Your Investment Learn about zero-trust network access (ZTNA) beyond VPN replacement and how to realize the most value for your investment.
| Sep 23, 2020 Understanding the Difference Between an MSSP and MDR The decision between MSSP vs. MDR should be based on specific factors. Learn how you can make the right choice for your organization. Read the blog.
| Sep 17, 2020 How Multi-Cloud Environments Expand Your Attack Surface and How to Manage and Reduce the Risk Learn how multi-cloud environments expand your attack surface, best practices to manage and reduce the risk
| Sep 16, 2020 Avertium enhances LogRhythm expertise with acquisition of 1440 Security Sunstone Partners-backed Avertium acquires national MSSP 1440 Security to enhance LogRhythm and advanced threat detection capabilities.
| Sep 15, 2020 How to Leverage Your SIEM to Detect and Respond to Ransomware The key to detecting ransomware is laying the necessary groundwork first. Avertium explores how to leverage SIEM technology to respond to attacks.
| Sep 14, 2020 Palo Alto Firewall vulnerabilities discovered and patched This threat report is about a series of Palo Alto firewall vulnerabilities in the software suite ranging in criticality.
| Sep 9, 2020 Why Enterprises are Adding Chief Privacy Officer to C-Level Leadership Learn why the Chief Privacy Officer is needed for personal data privacy strategic decision making and why the CPO is here to stay.
| Sep 8, 2020 Assessing whether you need Virtual CISO (vCISO) Services, and what to expect Learn if you need virtual CISO (vCISO) services for cybersecurity leadership to improve security and meet regulations and compliance.