Archives for 

Protect Your Business

Here’s Why You Need Vulnerability Lifecycle Management – Chuck Leaver

Written By Dr Al Hartmann And Presented By Chuck Leaver   The following heading hit the news recently on September 7, 2017: Equifax Inc. today announced a cyber security incident possibly affecting approximately 143 million U.S. consumers. Bad guys exploited a U.S. website application vulnerability to access to particular files. Based upon the company’s investigation, […] Continue reading →

Take This Action In The Light Of The Equifax Breach – Chuck Leaver

Written By Michael Levin And Presented By Chuck Leaver   Equifax, among the 3 major U.S. based credit reporting services just announced a significant data breach where cyber criminals have taken sensitive information from 143 million American customers. Ways that the Equifax security infiltration WILL affect you: – Personally – Your personal and household’s identity […] Continue reading →

Easily Integrate Ziften’s Endpoint Protection Into Your Already Established Security Architecture – Chuck Leaver

Written By Roark Pollock And Presented By Ziften CEO Chuck Leaver   Security practitioners are by nature a mindful bunch. Being cautious is a quality most folks likely have entering into this industry given its mission, however it’s also surely a quality that is picked up gradually. Paradoxically this is true even when it pertains […] Continue reading →

Customers Of Ziften Have Protection From Harmful Flaw In Petya Variant – Chuck Leaver

Written By Josh Harriman And Presented By Chuck Leaver Ziften CEO   Another infestation, another problem for those who were not prepared. While this latest attack is similar to the earlier WannaCry danger, there are some differences in this latest malware which is an alternative or brand-new strain much like Petya. Called, NotPetya by some, […] Continue reading →

Security And IT Can Work Together With SysSecOps – Chuck Leaver

Written By Chuck Leaver Ziften CEO   It was nailed by Scott Raynovich. Having actually dealt with numerous organizations he realized that one of the biggest difficulties is that security and operations are 2 distinct departments – with drastically different objectives, different tools, and varying management structures. Scott and his expert company, Futuriom, just finished […] Continue reading →