Monthly Archives: June 2021

By Dan May, Commercial Director at ramsac Software is not without its vulnerabilities. Even if these flaws exist unintentionally, any backdoor or point of unauthorised access can be exploited advantageously by cyber-criminals, which is why programmers analyse for, and “patch”, these vulnerabilities. Software needs to be monitored tightly, and routinely, to […]

Lessons to Learn from the 2021 Microsoft Exchange Zero-day Attack

By Devin Partida, Editor-in-Chief, As more people get vaccinated and states lift their pandemic restrictions, businesses must reconsider their security protocols. Whether that’s taking new preventive measures or upgrading current systems, now is the time to make changes. Businesses in all industries had to keep up with federal and state […]

5 Security Tips for Businesses Reopening in 2021

In Episode S3E6 our guest is Brian Hajost, President and Founder of SteelCloud, a company that develops technology for automated remediation of endpoints to effectively meet compliance mandates. In this fun and informative conversation, Brian delves into what it means for organizations to meet the various compliance mandates they are […]

Automated Remediation

Optical & Digital Document Security 17-19 January 2022, Vienna, Austria The technical conference for physical, digital and virtual document security How do we ensure that our financial transactions and identity verification conducted on a smartphone, tablet or other computer are as secure as they have been using banknotes and identity […]

Reconnaissance Announces New Conference for Identity and Transactional Security in ...

LOS ANGELES, CA — As phishing becomes one of the most prevalent attack vectors in the cybersecurity landscape, NINJIO, a cybersecurity awareness training company currently serving some of the largest organizations in the world, has launched the first-ever simulated Phishing as a Service (PHAAS) platform to help companies thwart these […]

NINJIO Releases Enterprise Simulated Phishing Solution as Cyberattacks Continue to ...