Security Advisory: Critical Vulnerability for Microsoft Exchange Found

It has recently been reported and come to the attention of Microsoft of two critical zero-day vulnerabilities that affect Microsoft Exchange Server 2013, Exchange Server 2016, and Exchange Server 2019. The first one, identified as CVE-2022-41040, is a server-side request forgery (SSRF) vulnerability, while the second one, identified as CVE-2022-41082, allows remote code execution (RCE) […]

Hybrid Work: Better for Companies and Employees

Despite offices already at full operational capacity globally and in the Philippines, full-time office setups may not be as common as before. If we learned one thing from the Global pandemic, it would be that remote work can work for some industries. It is not only something that benefits the employee but can also be […]

Tech Talk: Exploring the CASB Technology

Cloud Access Security Broker (CASB) technology might be a familiar term if you have been looking for ways to improve your cyber security in the past year. Cloud service has changed the way businesses tackle security due to its mobile nature. Firewalls around the internal network to keep attackers out no longer works thanks to cloud technology. Business […]

Zero Trust: Citrix Secure Private Access

In today’s hybrid environment, traditional enterprise architecture and security models are not up to standard when faced with the accompanying complex application-security requirements it brings. Companies are now shifting towards SaaS while maintaining their enterprise apps inside their datacenters. This is so that data is more accessible to their users as they collaborate through remote […]

Tech Talk: Privileged Access Management and Zero Trust

In today’s business environment, we are facing an increased amount of risk hitting the business networks. Attacks are becoming more frequent and are no longer just targeted at your perimeter. Threats are now targeting businesses endpoints and users outside your security parameters. Remote work has grown tremendously over the past few years and has contributed to today’s […]

Tech Talk: Looking at the 3 Main Use Cases for DLP

When discussing Data Loss Prevention (or DLP), many would assume that it is more of a problem for the physical infrastructure. Organizations don’t consider that even the cloud can carry risks of DLP as their mindset of human error or data corruption. We went into more detail in our previous article, that DLP covers more than […]