In this edition of our Vendor Partner Round-Up, we’re decidedly not mentioning a single word regarding ransomware (for once). In  proving that there is life beyond shut-down pipelines and multi-million-dollar payouts… we’re taking a look around our vendor partner blogs and learning what’s happening around the world. This edition features some scary revelations from Check Point and Kaspersky’s research teams regarding falsified human rights documents, the importance of developing trust in educational institutions, a look at modern Zero Trust solutions, and much more.  

 

CHECKPOINT

Check Point Research (CPR), in collaboration with Kaspersky’s Global Research & Analysis Team (GReAT), have been tracking an ongoing attack targeting a small minority group of Uyghur individuals in Xinjiang and Pakistan, and they’ve uncovered the use of fake human rights documents and websites used in Uyghur-targeted cyber attacks. Learn more about this ugly attack on Check Point’s blog.

 

EXTRA HOP

ICMP, a network-level protocol that offers info on network transmission issues, and according to ExtraHop’s recent blog post “What is ICMP Tunneling and How to Protect Against It?”, it is a hot target for transporting commands and exfiltrate data via ICMP tunneling. Learn how to protect your organization with these important insights.

 

OKTA

In a world of fast-paced cloud adoption, digital transformation and Zero Trust, it’s never been more important to prioritize identity. How does this tie in with Okta’s recent acquisition of Auth0? President of Worldwide Field Operations Susan St. Ledger weighs in on this during a recent blog post on the company’s website titled, “Empowering Every Organization with Identity.”

 

DUO SECURITY

What does it take to foster trust in higher education institution, from a cybersecurity perspective? As colleges and universities continue to adjust to online and hybrid teaching styles, this blog post titled, “Trusting Remote Work Security in Higher Education,” from Duo Security highlights some keys for success.

 

BITGLASS

Zero-Trust is a pretty serious buzz-word in our industry. Want to be up-to-date on developing your Zero-Trust architecture? Bitglass is dispensing the tools you’ll need for your return to on-premises operations. Check out their blog, titled “Six Key Characteristics of a Modern Zero Trust Network Access (ZTNA) Solutions.”

Leave a Reply

Your email address will not be published. Required fields are marked *

Recent news posts

This is a sample blog post title.
Featured Image

“STATE OF CYBER 2021” BRINGS TOGETHER HOMELAND SECURITY, FBI, SECRET SERVICE AND LOCAL EXECUTIVES IN ST LOUIS

This is a sample blog post title.
Featured Image

Ransomware Kills: An insider look at the tragic effects of ransomware attacks

This is a sample blog post title.
Featured Image

Guest Blog: The Role of Security Operations in Combating Ransomware

This is a sample blog post title.
Featured Image

Wrap up – Looking back on Cybersecurity Awareness Month 2021

This is a sample blog post title.
Featured Image

Atlanta’s Chief Information Security Officers Debate Future of Cybersecurity; 2022 Trends

Attend an Event!

Connect and collaborate with fellow security innovators at our Virtual Cybersecurity Summits.

Register Today