Meltdown and Spectre: Here’s What Our Partners Are Doing to Protect You

No sooner do you have your arms around one cybersecurity vulnerability then another surfaces. This time it’s Meltdown and Spectre, both of which can cause data leak from kernel memory. These vulnerabilities are particularly worrying since they impact practically all computers and involve multiple IT vendors including processor players Intel, AMD, Qualcomm, and ARM.

This is Why 2018 Will Be the Year of Blockchain in Government

There’s been a lot of buzz about blockchain in 2017. It was only a few months ago in March 2017 that Betanews predicted that blockchain would be the buzzword that would take 2017 by storm. And it did, expanding beyond the financial community where it’s had a home for several years and breaking into other enterprise sectors.

But few foretold that blockchain would have such a hand in government digital transformation in 2017. In fact, the two go hand in hand.

What is Blockchain?

Are Your Endpoints a Risk? Take Control, Detect Risks, Automate Your Response

Getting to know the “enemy with no face” is critical to winning the cyber war. In fact, it’s the tagline from the U.S. Army’s latest cyber warrior recruitment ad. Yet, one of the biggest challenges to doing so is that most organizations have zero visibility into a significant percentage of the endpoints on their network. That’s because they are either not managed (BYOD, guest, and IoT), have disabled or broken agents, or aren’t detected by periodic scans.

NIST 800-63 For Unix/Linux Servers: Centrify vs. Password Vault Only Solutions

When it comes to controlling logins and privileges on Unix/Linux servers, Centrify’s philosophy is aligned with modern NIST recommendations, as opposed to traditional vendors whose solutions are centered around a Password Vault. Centrify believes users should login directly as themselves and elevate privileges granularly as needed and authorized.