Cobalt Iron Inc.: Cobalt Iron Compass Enterprise SaaS Backup Platform Now Provides SAML Integration
Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced that its Compass enterprise software-as-a-service (SaaS) backup platform now offers full support for Security Assertion Markup Language (SAML), an XML-based, open-standard data format for exchanging authentication and authorization data between parties. Through the Compass SAML integration, Cobalt Iron customers now have the convenience of managing user provisioning and authentication securely and easily from their preferred third-party identity providers.
The new integration makes Compass a SAML service provider, with all provisioning taking place outside of Compass in the identity provider s interface. This significantly improves Compass customers security and user administration in several ways.
Apr 27, 2021 16:48 EDT with 0 comments
Today, Microsoft has unveiled the April update for Power BI On-premises data gateway, highlighting new introductions which include PowerShell enhancements. For comparison, the update in February focused primarily only on the deprecation of some services, as well as the .NET 4.8 framework being made a requirement for all new Gateway installations.
To start off, the PowerShell cmdlets released last year to automate gateway installation and management have now been improved, with the following additions being noted:
Ability to view a gateway data source using “Get-DataGatewayClusterDatasource”.
Allow adding and removing of Service Principals as Data source users using Add-DataGatewayClusterUser.
Microsoft and
FireEye identified that file as a newly-discovered fourth malware backdoor used in the sprawling SolarWinds supply chain hack. An analysis of the malicious file and other submissions by the same VirusTotal user suggest the account that initially flagged the backdoor as suspicious belongs to IT personnel at the
National Telecommunications and Information Administration (NTIA), a division of the
U.S. Commerce Department that handles telecommunications and Internet policy.
Both Microsoft and FireEye published blog posts on Mar. 4 concerning a new backdoor found on high-value targets that were compromised by the SolarWinds attackers. FireEye refers to the backdoor as “Sunshuttle,” whereas Microsoft calls it “GoldMax.” FireEye says the Sunshuttle backdoor was named “
It was Russia wot did it: SolarWinds hack was done by Kremlin s APT29 crew, say UK and US theregister.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from theregister.com Daily Mail and Mail on Sunday newspapers.
This Tuesday, Aug. 4, 2009, photo shows the United States Chamber of Commerce building in Washington. Elite cyber spies have spent months secretly exploiting SolarWinds software to peer into computer networks, putting many of the company’s highest-profile customers in national . more > By Ryan Lovelace - The Washington Times - Thursday, April 15, 2021
Federal cyber officials on Thursday blamed the Russian Foreign Intelligence Service (SVR) for the SolarWinds hack of computer network management software and the targeting of COVID-19 research.
Previously, the government had said Russia was likely responsible for the hack that compromised nine federal agencies, but Thursday’s joint statement from the National Security Agency, FBI, and Cybersecurity and Infrastructure Security Agency provided more formal attribution of the hack that was publicly disclosed last year. The federal ag