Comprehensive software reviews to make better IT decisions
KnowBe4 Begins the Federal Risk and Authorization Management Program (FedRAMP) Authorization Process
KnowBe4, a leader in end-user security training, has begun the authorization process for the Federal Risk and Authorization Management Program (FedRAMP). This is yet another initiative by KnowBe4 to better secure the data collected by its customers.
FedRAMP provides a standardized approach for securing solutions in the cloud. By meeting these strict security requirements, KnowBe4 will be able to provide its federal, state, and local government customers with a more secure solution.
“Our commitment to helping government agencies better protect our nation is solidified by this new, strategic initiative,” said CEO Stu Sjouwerman. “KnowBe4’s journey to FedRAMP certification is just one component of our investment and focus on serving government agencies and helping them to manage the ongoing problem of social engineering.”
With GDPR having come into effect last year, data security has been top of mind for a lot of organizations around the world. Organizations like KnowBe4 are being proactive at protecting customer data and demonstrating that protection to its customers.
In September 2018, KnowBe4 completed the SOC2 Type 2 data security exam: a rigorous audit done by an independent third party to assess a solution against an established set of security-related criteria. According to KnowBe4, they were the first security awareness and training vendor to complete this exam.
Want to Know More?
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.
Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?
The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.
Qualys VMDR Is Now Live: Increasing Security Threats Requires Strong Vulnerability Management Software
Qualys VMDR has hit the live market. Originally unveiled in February 2020 at Qualys Security Conference, VMDR is now publicly available as of April 16, 2020. Partnering with both large and small MSSPs, VMDR is designed to be scalable to any business enterprise and to automate the entire management cycle on all endpoints.
Microsoft’s end-of-life support for Windows 7 has run into its first set of issues with its extended security updates (ESUs). Administrators who paid for the ESU found out their downloads are not applying.
Qualys’ newest product, VMDR (Vulnerability Management, Detection, and Response), will be available in March and will provide an all-in-one cloud-based solution for vulnerability management. VMDR will automate the entire management cycle on all endpoints.
Microsoft has added its Windows 10 Tamper Protection controls to the public version of Microsoft Defender. Previously available only to enterprise users, Tamper Protection is intended to better detect threats that make it past other defences and to provide remediation suggestions.
Qualys Research Labs, a vulnerability management provider, discovered a vulnerability in the OpenSMTPD Mail server used in conjunction with the OpenBSD operating system. This flaw allows for an attacker to execute arbitrary code with command privileges.