
Connectivity and Access, Unified Communications, Disaster Recovery, Security, Cloud and Infrastructure Services

The truth about Linux true and false commands Cybercrime group Elephant Beetle lurks inside networks for months CISA sees no significant harm from Log4j flaws but worries about future attacks 7 hot cybersecurity trends (and 2 going cold) New Log4Shell-like vulnerability impacts H2 Java SQL database Latest 5G specs highlight IoT support, better spectrum efficiency MITRE: To test and gain confidence in MSSPs, use ATT&CK framework FTC, SEC raise legal risks surrounding the log4j flaw The cloud comes down to earth Hybrid cloud demands new tools for performance monitoring How to buy enterprise firewalls Protecting PII: Examples, laws, and standards 5 top hybrid cloud security challenges New US CISO appointments, January 2022 UK NCSC updates Cyber Essentials technical controls requirements and pricing structure 3 types of edge-gateway vendors Top 8 cybersecurity predictions for 2022 Microsoft issues a fix for on-prem Exchange mail servers Pages