The COVID-19 pandemic forced many companies to adapt to a new work-from-home reality. We’re now past the initial shock of the COVID-19 pandemic, which forced many companies to quickly adapt to a new work-from-home reality. In the early days, business continuity, often at the expense of security, was the priority in decision making around remote…

In October 2019, Google announced it had achieved “quantum supremacy” in a Forbes article entitled “Quantum Computing Poses An Existential Security Threat, But Not Today.” The Google team had developed a quantum computer that could complete a computation in just over three minutes instead of the 10,000 years it would have taken on a traditional…

As more remote work from home happens, your collaboration tools need more scrutiny. A popular choice for instant messaging and video conferencing is Microsoft’s Teams, and securing this application will be a challenge. Teams already has had one major exploit that would allow a malicious actor to use the Microsoft Teams Updater to download any…

At the recent Black Hat conference, Peleg Hadar and Tumar Bar of SafeBreach Labs pointed out that the way to a network’s heart is often through its printers. In 2010, one of the vulnerabilities Stuxnet used was a remote code execution on a computer with printer sharing enabled. To reach Iran’s centrifuges, Stuxnet exploited a…

The information security industry frequently utilizes the phrase “people, processes and technology” (PPT) to describe a holistic model of securing the business. But though this phrase is repeated ad nauseum, we seem to have forgotten one of those three primary pillars: people. In an effort to secure things technically, we prioritize the protection of our…

Endpoint security has long been an important part of cybersecurity within any enterprise’s overall security architecture, particularly to provide protection for remote devices that connect to an enterprise network. When laptops, smartphones, or desktop computers connect to a network, they establish network nodes and create points of vulnerability. Endpoint security might also be used with…

Ericom Application Isolator separates corporate apps from unauthorized users to prevent ransomware

Ericom Software announced the introduction of Ericom Application Isolator, a new solution that integrates with existing remote access VPNs and Next Generation Firewalls to secure corporate applications and data from the security risks associated with excessive access rights inside a network. Ericom Application Isolator addresses the security risks created by the broad access rights granted…