Scattered Spider: How Certes DPRM Could Have Broken the Attack Chain
Scattered Spider (UNC3944 / Octo Tempest) has recently shifted its target to retail, and the results have been devastating. From multi-week outages to hundreds ...
Read more
Scattered Spider (UNC3944 / Octo Tempest) has recently shifted its target to retail, and the results have been devastating. From multi-week outages to hundreds ...
Read more
CJIS 6.0 is more than an update, it’s a critical step toward achieving and maintaining full CJIS compliance in an evolving threat landscape. With sweeping chang...
Read more
Business Data Breach: The Consequences of a Cybercrime Data Breach News stories about cybersecurity data breaches are sometimes difficult to avoid and even more...
Read more
How can the Utilities Sector be protected from a cyber-attack? Author: Simon Hill, Legal & Compliance, Certes Networks. As published in The FinTech News, Au...
Read more
How can the Utilities Sector be protected from a cyber-attack? Author: Ann Chesbrough, Global Marketing Director, Certes Networks. Certes Networks continues to ...
Read more
For years, Active Directory (AD) has been the gold standard for identity and access management. It’s embedded in the DNA of enterprise IT, the engine behind log...
Read more
How can the Utilities Sector be protected from a cyber-attack? Author: Adrian Niculae, VP Business Development EMEA and Paul Vidic, Director, Certes Networks As...
Read more
Data Security: Why the responsibility sits with the C-Suite In today’s digital era, data has become the most valuable asset for companies across all industries....
Read moreIn an era where data breaches and cyber threats loom large, safeguarding sensitive information has never been more critical. Recognising the pressing need for o...
Read moreData loss through breaches is deemed a negligent act by the C-Suite, as recent legal actions show. This emphasises the need for CEOs to prioritise data protecti...
Read more
The UK government’s recent proposal to ban public sector bodies – including the NHS, schools, and local councils – from making ransomware payments appears to se...
Read more
It’s all about the data. Regulators focus on it, cyber criminals want it, and CISOs and compliance officers are caught in the middle, worrying how to protect it...
Read more
Hospitals across the US rely on legacy infrastructure that was never built to meet today’s cybersecurity demands. MRI scanners, patient monitors, and lab system...
Read more
Certes Networks enters into an extended partnership with leading cybersecurity services provider in the Middle East August 17, 2020 – Certes Networks has entere...
Read more
End-to-End Data Protection for ITAR Compliance: A new approach eradicating time-consuming compliance and quickly ensuring the security The International Traffic...
Read more