Category: Security

Chuck Leaver – Is Your SysSecOps Solution Really Flexible?

Written By Chuck Leaver   You will find that endpoints are all over. The device you read this on is an endpoint, whether it’s a desktop, laptop, tablet, or phone. The HEATING AND COOLING controller for your structure is an endpoint, presuming it’s linked to a network, and the WiFi access points and the security

Chuck Leaver – New Meltdown And Spectre Threats And How Ziften Helps

Written By Josh Harriman And Presented By Chuck Leaver   Ziften is aware of the latest exploits affecting virtually everybody who deals with a computer system or digital device. While this is a huge statement, we at Ziften are working very hard helping our consumers find susceptible assets, fixing those susceptible systems, and keeping track

Chuck Leaver – What Is SysSecOps And Why Do You Need It?

Written By Alan Zeichick And Presented By Chuck Leaver   SysSecOps. That’s a neologism, still unseen by many IT and security administrators – but it’s being discussed within the market, by analysts, and at technical conferences. SysSecOps, or Systems & Security Operations, refers to the practice of combining security teams and IT operations teams to

Chuck Leaver – Ziften Helps You Fight Microsoft Word Phishing Attacks

Written By Josh Harriman And Presented By Chuck Leaver   A fascinating multifaceted attack has actually been reported in a recent blog by Cisco’s Talos Intelligence group. I wanted to talk about the infection vector of this attack as it’s quite interesting and something that Microsoft has actually promised not to fix, as it is

Chuck Leaver – Ransomware Can Be Prevented And Managed Taking These 4 Actions

Written By Alan Zeichick And Presented By Chuck Leaver   Ransomware is real, and is striking people, services, schools, health centers, local governments – and there’s no sign that ransomware is stopping. In fact, it’s probably increasing. Why? Let’s face it: Ransomware is probably the single most reliable attack that cyber criminals have ever developed.

Chuck Leaver – Zero Day Exploits And Attack Prevention Through Our Collaboration With Microsoft

Written By David Shefter And Presented By Chuck Leaver   This week we announced a collaboration with Microsoft that combines Ziften’s Zenith ® systems and security operations platform, and Windows Defender Advanced Threat Protection (ATP) delivering a cloud based, “single pane of glass” to spot, see, examine, and respond to innovative cyber attacks and breaches

Chuck Leaver – If You Want Protection Against The KRACK Vulnerability Do This

Written By Dr Al Hartmann And Presented By Chuck Leaver   Enough press has actually been produced over the Wi-Fi WPA2-defeating Key Reinsertion Attack (KRACK), that we do not have to re-cover that again. The initial discoverer’s website is an excellent location to examine the concerns and link to the in-depth research findings. This might

Chuck Leaver – Your Security Awareness Training Needs To Be Effective

Written By Chuck Leaver Ziften CEO   Effective business cybersecurity assumes that individuals – your staff members – do the right thing. That they don’t hand over their passwords to a caller who claims to be from the IT department doing a “qualifications audit.” That they don’t wire $10 million to an Indonesian checking account

Chuck Leaver – Passion For Ziften And Splunk At Splunk .conf

Written By Josh Applebaum And Presented By Chuck Leaver   Like a number of you, we’re still recovering from Splunk.conf recently. As usual,. conf had fantastic energy and the individuals who remained in attendance were enthusiastic about Splunk and the numerous use cases that it provides through the large app ecosystem. One important announcement throughout

Chuck Leaver – Protect Your Organization With Ziften Services

Written By Josh Harriman And Presented By Chuck Leaver   Having the right tools to hand is a given in our industry. But having the correct tools and services is one thing. Getting the best worth from them can be an obstacle. Even with all the best objectives and sufficiently trained workers, there can be