Latest
JFrog Ltd Introduces a New Runtime Security Solution
Absolute Acquires Syxsense to Enhance Endpoint Security Operations
Check Point Software Acquires Cyberint, a Cybersecurity Startup
Cisco Acquires Robust Intelligence, AI Model Data Security Startup
Google Announces New Security Features at Cloud Security Summit
Google Announces New Security Features at Cloud Security Summit
Google Announces New Security Features at Cloud Security Summit
Google Announces New Security Features at Cloud Security Summit
Google Announces New Security Features at Cloud Security Summit
Google Announces New Security Features at Cloud Security Summit
Login
Login
Insights
cloud
solutions
virtualization
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
News
cloud
solutions
virtualization
digital
digital marketing
social media marketing
Finance
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
Whitepapers
All
Security
ランサムウェア対策の 7 つのベスト�...
cyber snapshot, issue 7 - five hot topics in cyber...
veeam's ai security: zero trust demos...
api 보안 ebook...
api 安全電子書...
fortifying cyber defenses with managed detection a...
better together: the benefits of integrating cyber...
get a sneak peek into revealx...
forrester®: the total economic impact™ of extra...
2024データプロテクションレポート...
the state of ddos threats...
the buyer’s guide to sase use cases...
hope on the horizon: how to build a better cyberse...
connectivity cloud, explained...
forrester consulting research: regaining control w...
2024 api security and management report...
new insights for threat and data protection-what l...
new insights for threat and data protection-what l...
close the gapz in your security strategy...
how to protect industrial processes in ot-it conve...
All
Security
explore 5 tactics to enhance innovation at the edg...
advanced api security: why gateways alone aren't e...
intrusion detection system: the cornerstone of net...
single-vendor sase: key use cases to consider befo...
why are targeted ransomware attacks so successful?...
why threat hunting cyber security is today’s nee...
dynamic application security testing for technical...
critical role of virtual firewall in optimizing en...
secure voice communications: safeguarding your con...
role-based access control: inherent necessity of e...
best sase solution to protect your remote workforc...
uncover ai-powered cyberattacks for advanced threa...
recognize the cost of downtime: uncover hidden exp...
recognize the cost of downtime: uncover hidden exp...
learn security vendor consolidation to enhance sec...
outdated endpoint security solutions: a security b...
deciphering cryptowall ransomware to plot a cyber ...
navigating shadow data: securing your sensitive bu...
cloud application security solutions for complete ...
adaptive authentication fortifying businesses with...
All
Security
jfrog ltd introduces a new runtime security soluti...
absolute acquires syxsense to enhance endpoint sec...
check point software acquires cyberint, a cybersec...
cisco acquires robust intelligence, ai model data...
google announces new security features at cloud se...
google announces new security features at cloud se...
google announces new security features at cloud se...
google announces new security features at cloud se...
google announces new security features at cloud se...
google announces new security features at cloud se...
google announces new security features at cloud se...
google announces new security features at cloud se...
google announces new security features at cloud se...
fortra warns of a vulnerability that can cause dos...
cloudbees acquires launchable, ai software testing...
fortinet updated operational technology security p...
linx security secures usd 33 m for its identity se...
microsoft reveals, crowdstrike update impacts 8.5 ...
atlassian’s trello data breach: 15m emails leake...
snowflake introduces multifactor authentication af...
All
Security
startup zero networks secures usd 20m...
new searchlight security module brings extra intel...
data privacy best practices every business should ...
Home
Search results for: data theft
Search Results for:
data theft
National Amusements Data Breach Affects 82K People
Insights Desk
Dec 28, 2023
Highlights: In a communication addressed to those impacted, National Amusements outlines the breach, characterizing it as involving “suspicious activity” that led to unauthorized individuals ...
All You Need to Know about Identity Theft in 2023
Insights Desk
May 10, 2023
Highlights: Unemployment fraud is also on the rise, with criminals using stolen identities to claim benefits. Despite efforts to prevent identity theft, it remains a significant threat. Don't ...
Data of 10M Customers Hacked from JD Sports, a UK Retailer
Insights Desk
Jan 31, 2023
Highlights: The information hacked includes the customer’s name, delivery and billing addresses, email IDs, order details, contact number, and payment cards’ last four digits. JD Sports i...
Report: Nearly 50% of 2021 Federal Employee Phishing Attacks Attempted Identity Theft
Insights Desk
Jan 03, 2023
Highlights: According to Lookout’s 2022 Government Threat Report, mobile phishing and device vulnerability risk in US federal, state, and local governments is rising. In 2021, over 50% of phish...
Using a Real-Time Data Platform to Combat Financial Fraud
Insights Desk
Nov 28, 2022
Highlights: Many firms are turning to artificial intelligence (AI) and machine learning to provide automated transaction scoring created for online banking (ML) speed and scale. Some banks ar...
Cybersecurity: Combating Modern Threats with Graph Databases
Research Desk
Mar 14, 2022
Wednesday, March 30, 2022 7:30 a.m. - 10:30 a.m. PT | 15:30 - 18:30 BST “Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win.” – John Lambert, Distingu...
Israeli Cloud Data Security Startup Eureka Secures USD8M in Funding
Insights Desk
Jan 20, 2022
Highlights – The firm allows security teams to mitigate data loss risk and theft in multi-cloud environments by taking control of an organization’s entire cloud data security posture and comp...
AppSealing Launches Data Encryption Solution to Secure Android Applications
Insights Desk
Sep 27, 2021
Highlights – The solution supports AES 256 encryption, which is the strongest encryption standard across the world. The Data Encryption solution will help companies from the fintech, bankin...
Part II: Why Data Security Needs Data Sanitization! – Conclusion
Insights Desk
Apr 05, 2021
The earlier part highlighted ‘what data sanitization is and what different methods are used to perform data sanitization.’ But what is more important is to learn ‘Why do businesses need to under...
3 Minutes That Decode Data Security in the SaaS Age: The Extension
Insights Desk
Sep 02, 2020
Want to make the most of SaaS without putting sensitive information and data at stake? Then you are at the right place. In the first part of the blog, we explored SaaS and some of the security concern...
Posts navigation
1
2
…
13
Next
Whitepapers
News
Insights
Security
Security
Security
We use cookies to ensure we give you the best experience on our website. We strongly encourage you to read our updated
Privacy Policy
Agree