Chuck Leaver – What You Need To Know About Patch Validation

Written By Logan Gilbert And Presented By Chuck Leaver   Introduction A current report suggests almost 20,000 brand-new software application vulnerabilities were found in 2017 – an all time record. Think of that for a second. That’s an average of fifty five new vulnerabilities each day. That’s a large amount for any IT store to

Chuck Leaver – Making Sense Of GDPR And Monitoring Cybersecurity

Written By Dr Al Hartmann And Presented By Chuck Leaver   Robust enterprise cybersecurity naturally includes monitoring of network, endpoint, application, database, and user activity to prevent, identify, and react to cyber risks that might breach personal privacy of business staff, partners, suppliers, or clients. In cyber space, any blind spots become free fire zones

Chuck Leaver – The Lowdown On Whitelisting And Blacklisting

Written By Roark Pollock And Presented By Chuck Leaver   Intro As with any type of security, the world of IT security is concerned with developing and implementing a set of allow/disallow guidelines – or more officially entitled, policies on security. And, simply stated, allow/disallow rules can be expressed as a ‘whitelist’ or a ‘blacklist’.

Chuck Leaver – Here Is How You Hunt Using Windows Defender ATP

Written By Josh Harrimen And Presented By Chuck Leaver   Following on the heels of our current partnership announcement with Microsoft, our Ziften Security Research team has actually started leveraging an extremely cool part of the Windows Defender Advanced Threat Protection (Windows Defender ATP) Security Center platform. The Advanced Hunting feature lets users run queries

Chuck Leaver – Get The Lowdown On RSA 2018

Written By Logan Gilbert And Presented By Chuck Leaver   After spending a couple of days with the Ziften team at the 2018 RSA Conference, my innovation viewpoint was: more of the very same, the typical suspects and the typical buzzwords. Buzz words like – “AI”, “machine learning”, “predictive” were wonderfully worn-out. Lots of attention

Chuck Leaver – How To Deal With Unmanaged Assets In The Cloud

Written By Logan Gilbert And Presented By Chuck Leaver   All of us identify with the image of the masked villain bending over his computer late at night – accessing a corporate network, stealing important data, vanishing without a trace. We personify the enemy as smart, determined, and crafty. But the reality is the large

Chuck Leaver – Microsoft Leads The Way With Intelligent Security Association

Written By David Shefter And Presented By Chuck Leaver   It’s a fantastic strategy: Microsoft has developed a mechanism for third party security businesses, like Ziften, to cooperate to better secure our customers. Everyone wins with the new Microsoft Intelligent Security Association, revealed very recently – and we are proud to be a founding member

Chuck Leaver – The Best Ziften Channel Program Yet

Written By Greg McCreight And Presented By Chuck Leaver   If you are a reseller, integrator, distributor, managed service provider – the new Ziften Activate Partner Program is now available, it’s ready, and will be great for your bottom line (and for lowering your customers’ stress and anxiety about cybersecurity). Ziften is 100% focused on

Chuck Leaver – Migrating Your Assets To The Cloud The Painless Way

Written By Logan Gilbert And Presented By Chuck Leaver   It bears repeating – the Web has forever changed the world for individuals and organizations alike. In the case of the latter, every aspect of modern IT is going through digital improvement. IT departments all over are under pressure to make info extremely accessible and

Chuck Leaver – Hot Security Opportunity For Microsoft Channel Partners

Written By Greg McCreight And Presented By Chuck Leaver   Windows Defender Advanced Threat Protection (WDATP) is very good, popular with Microsoft channel partners all over the world. It is highly likely you’re currently working with Microsoft clients to install and look after WDATP on their Windows end points. I’m delighted to tell you about