Latest
Nozomi Networks and Mandiant Strengthen Bond to Foster Security
Precision AI Security Solutions Redefines Safety & New Standards
Akamai Technologies Acquisition of Noname Security for USD 500M
Synopsys’ Software Integrity Group Sale for USD 2.1B
Microsoft’s New Security Features Empower SOC in Defender XDR
Oasis Security’s Series A Expansion Strengthens NHIs Protection with USD 35M Boost
Dropzone AI Cybersecurity Funding Reaches USD 16.85M
Zscaler ThreatLabz 2024 Phishing Report Flags AI's Role in Phishing
Red Hat Updates Trusted Software Supply Chain to Bolster Security
Red Hat Updates Trusted Software Supply Chain to Bolster Security
Login
Login
Insights
cloud
solutions
virtualization
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
News
cloud
solutions
virtualization
digital
digital marketing
social media marketing
Finance
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
Whitepapers
All
Security
state of ransomware 2024...
endpoint best practices to block ransomware...
best practices for securing your network from rans...
security outcomes report volume 3: achieving secur...
hybrid firewall ck_toolkit_data center firewall...
analyst - gartner workload and network security hy...
use the 2023 mitre attck® evaluations results for...
automate security operations with the multilayered...
current security solutions and user training are n...
detendo adversários ativos...
detenga a los adversarios activos...
stopping active adversaries: lessons from the cybe...
guia da sophos para seguro de proteção digital...
guía de sophos sobre ciberseguros...
sb - simplify wired and wireless network security ...
industry insights – three ways fortinet hybrid m...
kmsat demo: new school security awareness training...
the real world: new-school security awareness trai...
critical considerations when choosing your securit...
2023 phishing by industry benchmarking...
All
Security
cyber hazard of rainbow table attacks compromising...
defending against password spraying: fortifying yo...
role of digital immune system in strengthening bus...
what is cybersecurity asset management & why i...
the growing threat of ai malware...
what is cyber espionage? attacks jeopardizing busi...
menace of ping flood attacks: a growing network pe...
explore reasons & steps to stop social enginee...
a comprehensive guide on saas risk management...
why is operational technology cybersecurity essent...
what are web application firewalls (wafs)? robust ...
code injection attacks: a guide to security preve...
understanding dictionary attacks in the intersecti...
a guide to cybersecurity asset management...
understanding operational technology security risk...
the best cloud security trends in 2024...
guide on what is zoombombing and preventive measur...
decoding smurf attacks: the concept, mechanics, im...
your go-to security information and event manageme...
managed detection and response: a security imperat...
All
Security
nozomi networks and mandiant strengthen bond to fo...
precision ai security solutions redefines safety &...
akamai technologies acquisition of noname security...
synopsys’ software integrity group sale for usd ...
microsoft’s new security features empower soc in...
oasis security’s series a expansion strengthens ...
dropzone ai cybersecurity funding reaches usd 16.8...
zscaler threatlabz 2024 phishing report flags ai's...
red hat updates trusted software supply chain to b...
red hat updates trusted software supply chain to b...
wiz inc. acquisition negotiations to buy lacework ...
armis inc. acquires silk security inc. in a deal w...
vorlon secures usd 15.7m to address third-party ap...
akamai to acquire noname security reportedly for u...
cohesity secures usd 150m from ibm nvidia, expand...
iphone mercenary spyware targets users in 92 count...
descope’s new features streamline user onboardin...
sama launches sama red team for ai model’s secur...
cyera’s series c funding reels usd 300m...
darktrace plc’s ‘darktrace activeai security p...
All
Security
startup zero networks secures usd 20m...
new searchlight security module brings extra intel...
data privacy best practices every business should ...
Home
Page 19
Search Results for:
data protection solutions
Does Cybercrime-as-a-Service Exist?
Insights Desk
Jun 01, 2021
The demand for cloud computing has driven the growth of Everything-as-a-Service or XaaS. Providing users with easy deployment, accessibility, and cost savings paved ways for service providers to build...
Entrust’s HyTrust CloudControl Solution Supports VMware Cloud Foundation in Security Management
Insights Desk
Apr 19, 2021
Entrust, a global leader in trusted identity, payments, and data protection, has declared its HyTrust CloudControl solution, which is now an Entrust business. It supports VMware Cloud Foundation that...
Reblaze Releases a New CNCF Sandbox Security Project
Insights Desk
Mar 12, 2021
Reblaze, an Israeli cloud-native, managed application security solution provider, has released a commercial version of Curiefense, a Cloud Native Computing Foundation (CNCF) sandbox security project....
Moving with Zero Trust Security During COVID-19
Insights Desk
Jan 05, 2021
A security framework focuses on avoiding breaches by eliminating undue trust. A traditional network is based on the idea of inherent trust; a zero-trust framework assumes that every device and user, o...
Transitioning Network Security Controls to the Cloud: The Emergence of Elastic Cloud Gateways
Research Desk
Jan 04, 2021
Fundamental changes to network architectures, primarily due to the adoption of cloud services and the implementation of mobility, have rendered traditional approaches to defending the perimeter—to t...
Zscaler Named a Leader in the Gartner Magic Quadrant for Secure Web Gateways
Insights Desk
Dec 28, 2020
Zscaler, a cloud security firm, has been chosen by Gartner to be the only Leader in the December 2020 Magic Quadrant for Secure Web Gateways. Zscaler is positioned furthest in the completeness of v...
2nd Watch in Collaboration with Armor Aims to Deliver a Managed Security Service
Insights Desk
Dec 12, 2020
2nd Watch, leading cloud migration and managed cloud services provider, has joined forces with Armor, a global cloud security and compliance software provider. The collaboration aims to offer a Manag...
The Rise of Machine Learning (ML) in Cybersecurity: How This Critical Capability Can Help Prevent Today’s Most Sophisticated Attacks
Research Desk
Dec 01, 2020
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the an...
CyberArk Aims to Improve Security and Compliance for Clients
Insights Desk
Nov 28, 2020
CyberArk, a global leader in privileged access management, announced its working with Forescout and Phosphorus. The collaboration enables organizations to secure the increasing number of IoT devices a...
AGT, NowSecure to Work Globally for Cybersecurity Resilience
Insights Desk
Nov 11, 2020
AGT, a leading provider of turnkey cybersecurity solutions, and NowSecure, the top mobile app security and privacy software solutions company, has decided to come together to deliver a new cybersecuri...
Posts navigation
Prev
1
…
18
19
20
…
22
Next
Whitepapers
News
Insights
Security
Security
Security