Category: Viral

‘Security is a team sport,’ Microsoft CVP Vasu Jakkal said on a panel this week. Microsoft solution providers are “critical” to the vendor’s plans for achieving and maintaining responsible artificial intelligence and security, Microsoft executives told CRN this week. During a panel on responsible AI and security held the week of Microsoft Build 2024, CRN…

Read More

May 23, 2024NewsroomThreat Intelligence / Vulnerability, The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting Apache Flink, the open-source, unified stream-processing and batch-processing framework, to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2020-17519, the issue relates to a case of improper access control…

Read More

“So once the acquisition closes, our partners will have the opportunity to join Palo Alto Networks’ partner program, if they’re not already part of that, so they will be able to then sell Palo Alto’s Cortex XSIAM,” IBM’s Channel Chief Kate Woolley tells CRN. IBM and Palo Alto Networks are working together to make sure…

Read More

The company says the acquisition of Informer will help with automating the identification of exposed assets. Bugcrowd unveiled the acquisition of a decade-old provider of external attack surface management capabilities, Informer, in the latest in a series of acquisitions in the space. Terms of the acquisition weren’t disclosed. Informer has 15 employees, Bugcrowd told CRN.…

Read More

Conversations about data security tend to diverge into three main threads: How can we protect the data we store on our on-premises or cloud infrastructure? What strategies and tools or platforms can reliably backup and restore data? What would losing all this data cost us, and how quickly could we get it back? All are…

Read More

May 23, 2024NewsroomEndpoint Security / Vulnerability Ivanti on Tuesday rolled out fixes to address multiple critical security flaws in Endpoint Manager (EPM) that could be exploited to achieve remote code execution under certain circumstances. Six of the 10 vulnerabilities – from CVE-2024-29822 through CVE-2024-29827 (CVSS scores: 9.6) – relate to SQL injection flaws that allow…

Read More

Digital Security As AI gets closer to the ability to cause physical harm and impact the real world, “it’s complicated” is no longer a satisfying response 22 May 2024  •  , 3 min. read We have seen AI morphing from answering simple chat questions for school homework to attempting to detect weapons in the New…

Read More

File Integrity Monitoring (FIM) is an IT security control that monitors and detects file changes in computer systems. It helps organizations audit important files and system configurations by routinely scanning and verifying their integrity. Most information security standards mandate the use of FIM for businesses to ensure the integrity of their data. IT security compliance…

Read More

‘For those partners who are building meaningful AI capabilities, we’re giving you access to Dell-validated designs,’ Dell Technologies’ Denise Millard told partners this week. ‘We’re doing the engineering to make sure those deployments are repeatable and scalable, and you don’t have to figure it out on your own. We’re giving you access to Dell Solutions…

Read More

Nvidia, Avanade and Snowflake were among the standout vendors at Microsoft Build 2024 in Seattle. Microsoft attracted some of the best and brightest AI, cloud computing and security companies, showcasing their latest and greatest offerings at the tech giant‘s annual Build conference this week. The Redmond, Wash.-based tech giant used the conference – which runs…

Read More