Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for July

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In July, the team discussed threat intelligence, notable vulnerabilities and trends, security operations center (SOC) ...
The Polar Bear in Your Kitchen: A Cybersecurity Analogy

The Polar Bear in Your Kitchen: A Cybersecurity Analogy

Chris Clements, VP of Solutions Architecture at CISO Global High-Tech Pest Control = Threat Detection & Response Imagine for a moment that your home has a rodent problem. To address this, you ...
zero-trust, micro-segmentation

Beyond Zero-Trust: The Impact of Adaptive Micro-Segmentation on Network Security

Security is enhanced with the introduction of dynamic zero-trust security, a method that continuously assesses the security posture of devices and users on the network ...
Security Boulevard

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for June 2024

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In June, the team discussed threat intelligence, notable vulnerabilities and trends, threat hunting, security operations ...

DON’T GET PWNED! Securing Yourself at Black Hat

Black Hat, one of the world’s largest security conferences, is a veritable playground for hackers. With thousands of security professionals and enthusiasts gathered in one place, it’s an irresistible target for those ...

Critical Exim Vulnerability Threatens Millions of Email Servers

Exim is a widely used, open-source mail transfer agent (MTA) for Unix and Unix-like operating systems. A critical vulnerability has been discovered in Exim that could allow attackers to bypass security filters ...
Get a demo

Cybersecurity Checklist: Preparing Your Devices for Summer Travel

Summer is here, and it’s time for that much-awaited vacation. But while you’re packing your bags and planning your itinerary, there’s one thing you shouldn’t overlook – the security of your digital ...

Intrusion Detection in Linux: Protecting Your System from Threats

Safeguarding your Linux environment from potential threats is more critical than ever. Whether you’re managing a small server or an extensive network, having hands-on knowledge of intrusion detection systems (IDS) is essential ...

Application Security Check Up