CyberSecurity Blog

Merck’s Success Story: Boosting Efficiency With RPA and Bots

How Merck Used Bots to Assist With Regulatory Filings in 23 Geographies Discover how Merck, a traditional global pharma giant, achieved efficiency by embracing RPA and bots for regulatory documentation. Learn how this technology revolutionized their workflow and what it mean for the future of the pharmaceutical industry.http://dlvr.it/SsXP76

Microsoft Expands Logging Access After Chinese Hack Blowback

ICYMI: E3 Licensees Unlock Access to More Cloud Logs After Only E5 Clients Could Spot Hack Microsoft customers will gain access to expanded cloud logging capabilities at no additional cost just days after lower-level customers were unable to detect a Chinese cyberattack. CISA has identified several security logs – critical to detect and prevent threat…
Read more

Security Agencies Urge Users to Patch Citrix Zero-Day Flaw

ICYMI: Vulnerable Citrix Appliances Used in Healthcare Sector; Exploits Seen in the Wild Top U.S. and Australian cybersecurity agencies strongly urged users to patch a critical zero-day flaw in Citrix ADC and Gateway appliances being exploited by unnamed threat actors in the wild. The bug, which is tracked as CVE-2023-3519, gives unauthenticated attackers RCE privileges.http://dlvr.it/SsV7RP

Reporting Cyber Incidents Within 72 Hours: Challenges Ahead

ICYMI: Many critical infrastructure sector organizations, especially smaller entities, will likely struggle to comply with an upcoming requirement to report cyber incidents to federal regulators within 72 hours – due to an assortment of reasons, said Stanley Mierzwa of Kean University.http://dlvr.it/SsV74Q

When Cybercriminals Go Phishing, Emails Get the Most Bites

Developing a Multilayered Defense Strategy for the Most Common Attack Techniques Despite the significant advances technology has made over the past few years, email remains one of the best tools for cybercriminals. Training is just one piece of the puzzle. The best defense against today’s cybercrime landscape is a multilayered security strategy.http://dlvr.it/SsV1PV

How to Shop for an API Security Platform

ICYMI: Consider Domains, Features, Ease of Integration, Scalability and Vendor Support API security platforms have become an essential part of any organization’s cybersecurity strategy, but with so many options available, it can be difficult to know how to choose the right one. In this article, we’ll discuss how to evaluate API security platforms and what…
Read more

Microsoft Expands Logging Access After Chinese Hack Blowback

E3 Licensees Unlock Access to More Cloud Logs After Only E5 Clients Could Spot Hack Microsoft customers will gain access to expanded cloud logging capabilities at no additional cost just days after lower-level customers were unable to detect a Chinese cyberattack. CISA has identified several security logs – critical to detect and prevent threat activity…
Read more

Security Agencies Urge Users to Patch Citrix Zero-Day Flaw

Vulnerable Citrix Appliances Used in Healthcare Sector; Exploits Seen in the Wild Top U.S. and Australian cybersecurity agencies strongly urged users to patch a critical zero-day flaw in Citrix ADC and Gateway appliances being exploited by unnamed threat actors in the wild. The bug, which is tracked as CVE-2023-3519, gives unauthenticated attackers RCE privileges.http://dlvr.it/SsRHtH

Reporting Cyber Incidents Within 72 Hours: Challenges Ahead

Many critical infrastructure sector organizations, especially smaller entities, will likely struggle to comply with an upcoming requirement to report cyber incidents to federal regulators within 72 hours – due to an assortment of reasons, said Stanley Mierzwa of Kean University.http://dlvr.it/SsRHTY

How to Create an Effective Disaster Recovery Plan for Your Business

A solid disaster recovery plan for businesses is essential in today’s tech-focused world. Without one, companies risk their reputation, customers’ personal information, and profits in the wake of an unpredictable event that …http://dlvr.it/SsR2Hx