Topic: network isolation
-
CISA, Partners Act on Critical Microsoft Exchange Vulnerabilities
CISA, NSA, and international partners have issued critical guidance for securing on-premises Microsoft Exchange Servers, as Microsoft ends perpetual security updates for Exchange 2016 and 2019, leaving systems vulnerable to cyber threats. Recommended actions include restricting administrative acc...
Read More » -
Scan Threats Anywhere with OPSWAT's Portable Drive
OPSWAT's MetaDefender Drive with Smart Touch is a portable device that scans for malware and ensures compliance on transient cyber assets without requiring network access, preventing potential cyberattacks before devices connect to secure environments. It is designed for critical infrastructure, ...
Read More » -
Proven Strategies for Long-Lasting IoT Devices
A strategic IoT security approach must balance compliance, visibility, and future-proofing, focusing on compliant infrastructure, device management, and emerging tech like AI and quantum computing. Visibility challenges in IoT stem from outdated devices lacking security protocols, necessitating r...
Read More » -
Kensington and Chelsea Council Discloses Data Breach
A significant cyber-attack on a third-party IT provider has compromised historical data from Kensington and Chelsea Council, potentially exposing residents' personal information and risking public release. Residents are urged to be highly vigilant against sophisticated phishing attempts that may ...
Read More »