Computerworld.com reported that “Upcoming generative AI features in unified endpoint management tools have the potential to bring new efficiencies and insights — but also to wreak havoc with enterprise systems and employee devices. Here’s how IT leaders can prepare. Generative artificial intelligence (genAI) capabilities and features are coming to unified

Continue Reading Get ready for GenAI on your UEM (Unified Endpoint Management) platform!

Computerworld.com reported that “The rapid evolution of consumer drone technology is reshaping its potential uses in many ways, including its application in cyberattacks.

Modern consumer drones are quieter, faster, and equipped with longer battery life, enabling them to operate further from their operators. They can autonomously navigate obstacles, track

Continue Reading  Anyone surprised that drones are the future of cybercrime?

CSOonline.com reported “Since modern enterprises run on software, poor vulnerability management represents a serious business risk. So, how are CISOs modernizing their programs to improve risk mitigation?” The April 2, 2025 article entitled “10 best practices for vulnerability management according to CISOs” (https://www.csoonline.com/article/3853759/10-best-practices-for-vulnerability-management-according-to-cisos.html) included these comments about #7.

Continue Reading Good advice from CISOs about 10 best practices for vulnerability management includes strict Service Level Agreements!

CSOonline.com reported that “A threat actor has reportedly breached Oracle Cloud infrastructure, exfiltrating six million sensitive authentication records and potentially endangering more than 140,000 enterprise customers. The attacker is now demanding ransom payments while actively marketing the stolen data on underground forums,…”  The March 24, 2025 article entitled ” Oracle

Continue Reading 140,000 Oracle Cloud enterprise customers at risk because of ransomware demand!

SCWorld.com reported that “Almost all businesses need cybersecurity insurance to manage their digital risk, but not all realize that there are ways to reduce their insurance premiums by implementing certain protections.” The March 26, 2025 article entitled “How two organizations beat the cyber insurance maze” (https://tinyurl.com/mu2wec54) included these

Continue Reading How MFA, EDR, and XDR can reduce the cost of Cybersecurity insurance!

BankInfoSecurity.com reported that “Buying Wiz for $32 billion reduces Google’s dependence on external vendors for multi-cloud security, mirroring Microsoft’s approach with Defender for Cloud,…”  The March 19, 2025 article entitled ” How Google’s $32B Wiz Acquisition Will Reshape Cloud Defense” (https://tinyurl.com/4z649faf) included these comments from Gartner’s Charlie Winckless:

Continue Reading $32B investment in Wiz will change Google’s Multi-Cloud!

DarkReading.com reported that “Expired domains can pose a significant cyber-risk for organizations. Vigilant domain management is the first step for sustainable mitigation.” The March 10, 2025 article entitled “Why You Should Track Down Expired Domain Names” (https://www.darkreading.com/cyber-risk/why-you-should-track-down-expired-domain-names) included these comments:

Cybercriminals are always looking for new ways to

Continue Reading Are you vigilant about domain name management?

DarkReading.com reported that “Three zero-day vulnerabilities in VMware products have put tens of thousands of organizations at risk of virtual machine (VM) escapes, which could lead to devastating breaches.  According to scanning data from the Shadowserver Foundation, there are more than 41,000 ESXi instances across the globe that are vulnerable

Continue Reading VMware escape is vulnerable because of Zero-Day flaws!