Latest
Zscaler ThreatLabz 2024 Phishing Report Flags AI's Role in Phishing
Red Hat Updates Trusted Software Supply Chain to Bolster Security
Wiz Inc. Acquisition Negotiations to Buy Lacework for USD 150M- USD 200M
Armis Inc. Acquires Silk Security Inc. in a Deal Worth USD 150 M
Vorlon Secures USD 15.7M to Address Third-party API Risks
Akamai to Acquire Noname Security Reportedly for USD 500 M
Cohesity Secures USD 150M from IBM Nvidia, Expands Partnership
iPhone Mercenary Spyware Targets Users in 92 Countries
Descope’s New Features Streamline User Onboarding Experience
Sama Launches Sama Red Team for AI Model’s Security Reliability
Login
Login
Insights
cloud
solutions
virtualization
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
News
cloud
solutions
virtualization
digital
digital marketing
social media marketing
Finance
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
Whitepapers
All
Security
security outcomes report volume 3: achieving secur...
hybrid firewall ck_toolkit_data center firewall...
analyst - gartner workload and network security hy...
use the 2023 mitre attck® evaluations results for...
automate security operations with the multilayered...
current security solutions and user training are n...
detendo adversários ativos...
detenga a los adversarios activos...
stopping active adversaries: lessons from the cybe...
guia da sophos para seguro de proteção digital...
guía de sophos sobre ciberseguros...
sb - simplify wired and wireless network security ...
industry insights – three ways fortinet hybrid m...
kmsat demo: new school security awareness training...
the real world: new-school security awareness trai...
critical considerations when choosing your securit...
2023 phishing by industry benchmarking...
state of email security report...
frost radar: sentinelone is an xdr market leader...
proactive attack surface management for aws worklo...
All
Security
what is cyber espionage? attacks jeopardizing busi...
menace of ping flood attacks: a growing network pe...
explore reasons & steps to stop social enginee...
a comprehensive guide on saas risk management...
why is operational technology cybersecurity essent...
what are web application firewalls (wafs)? robust ...
code injection attacks: a guide to security preve...
understanding dictionary attacks in the intersecti...
a guide to cybersecurity asset management...
understanding operational technology security risk...
the best cloud security trends in 2024...
guide on what is zoombombing and preventive measur...
decoding smurf attacks: the concept, mechanics, im...
your go-to security information and event manageme...
managed detection and response: a security imperat...
logic bombs unveiled: safeguarding businesses from...
exploring data center protection strategies...
decoding cross-site scripting (xss): navigating te...
the rise of self-defending networks...
the strategic role of deception technology in thre...
All
Security
zscaler threatlabz 2024 phishing report flags ai's...
red hat updates trusted software supply chain to b...
wiz inc. acquisition negotiations to buy lacework ...
armis inc. acquires silk security inc. in a deal w...
vorlon secures usd 15.7m to address third-party ap...
akamai to acquire noname security reportedly for u...
cohesity secures usd 150m from ibm nvidia, expand...
iphone mercenary spyware targets users in 92 count...
descope’s new features streamline user onboardin...
sama launches sama red team for ai model’s secur...
cyera’s series c funding reels usd 300m...
darktrace plc’s ‘darktrace activeai security p...
microsoft’s unified security operations platform...
priva’s automation expansion service with five n...
tanium partnership with microsoft shares endpoint ...
zafran debuts with usd 30m fund to fast-track vul...
skyflow’s new funds to be used to enhance data p...
google’s new report reveals a rise in zero-day e...
denexus collaborates with cipher for boosted indus...
sekoia aps warns about ‘tycoon 2fa,’ a phishin...
All
Security
startup zero networks secures usd 20m...
new searchlight security module brings extra intel...
data privacy best practices every business should ...
Home
Page 137
Search Results for:
data security
2020 Zero Trust Report
Research Desk
Jun 15, 2020
Enterprise adoption of the Zero Trust security model is gaining momentum as 72% of organizations plan to assess or implement Zero Trust capabilities in 2020 to mitigate growing cyber risk. With its...
Cloud-based Firewalls: Key to Protecting Employees While Remote Working
Insights Desk
Jun 12, 2020
Security is easily achievable when it is about physical places. Like the banks have ample physical security in place. These brick and mortar spaces accommodate security cameras and bulletproof glass t...
Shadow IT – Boon or Bane
Insights Desk
Jun 03, 2020
Introduction As cyber threats and remote work challenges linked to COVID-19 continue to rise, IT teams are increasingly under pressure to keep the security of organizations intact. One of the biggest...
McAfee: Work-from-Home System Increased External Attacks on Cloud Accounts by 630%
Insights Desk
Jun 01, 2020
The external cyberattacks on cloud services and collaboration tools like WebEx and Zoom increased by 630% between January and April, cybersecurity firm McAfee announced. A study named ‘Cloud Adop...
New Phishing Campaign Exploits Google’s Fame and Firebase Storage Platform
Insights Desk
May 28, 2020
Highlight: Google’s cloud mobile and web application development platform, Firebase, exploited by threat actors. Trustware has recently discovered new phishing campaigns that utilize schemes. Th...
British Airline easyJet Hacked and Compromised
Insights Desk
May 23, 2020
easyJet, a British Airline, is said to be hacked with a highly sophisticated source. The breach has managed to gain access to data such as email addresses and travel details of about 9 million easyJet...
Netwalker Ransomware Actors are up with a New Game Plan to go Untraceable
Insights Desk
May 21, 2020
It is scary to know that threat actors now are smartly making use of sneaky fileless malware techniques like the reflective Dynamic-Link Library (DLL) injection. Not just this, but these cybercrimin...
SMBs Experiences Cyberattacks Similar to Large Enterprises due to Cloud Shift
Insights Desk
May 21, 2020
According to the 2020 Verizon Data Breach Investigations Report, Small Businesses are seeing the same cyberattacks and techniques as large enterprises in contrast to previous years. It also stated tha...
Flexera Annual Vulnerability Review Report
Research Desk
May 18, 2020
Key Figures and Facts on Vulnerabilities From a Global Information Security Perspective The Flexera Annual Vulnerability Review Report analyzes the evolution of software security from a vulnerabili...
Hacker Group “ShinyHunters” Caught Selling More Than 73 Million User Records on Dark Web
Insights Desk
May 14, 2020
The last few months have witnessed data breaches for more than a few internet users. The hacking group ShinyHunters is selling about 73.2 million user records that were stolen from numerous websites. ...
Posts navigation
Prev
1
…
136
137
138
…
151
Next
Whitepapers
News
Insights
Security
Security
Security