Latest
Cisco Purchases Armorblox to Improve Cybersecurity with Generative AI
Halcyon and CISO Global Partner to Mitigate Extortion and Ransomware Attacks
Cohesity Increases Google Collaboration, Introduces AI Security Service
New Concentric AI Can Find Hardcoded Secrets and Key Credentials
An Attacker Accesses a Microsoft VM by Using the Azure Serial Console
1Password Unveils Passage to Build Passkey Verification
Stacklok Announces a USD 17.5 M Series A to Safeguard the Software Deployment Supply Chain
Island Releases its Updated Enterprise Browser to Enhance Corporate Security
Security Experts Identify Potential Threats to New Top-level Domains
IBM Buys Polar Security, a Data Security Platform in a USD 60M Deal
Login
Login
Insights
cloud
solutions
virtualization
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
News
cloud
solutions
virtualization
digital
digital marketing
social media marketing
Finance
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
Whitepapers
Guest Blogs
cloud
solutions
virtualization
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
All
Cloud
Finance
IT Infra
Best Practices
Security
azure in focus: cio roadmap to improved operations...
embedded application security y-word (easy)...
protecting financial services from ransomware atta...
putting trust in zero trust:...
identity management and security...
trusted access: modern management and security...
the guide to securing digital identities and minim...
horizons of identity security...
delivering software securely...
2022 state of devops (dora)...
microsoft security mastery: closing the gap to zer...
nasuni ransomware protection : nasuni file data pl...
implement 10 cloud data security best practices...
achieving pervasive security above, within and bel...
enterprise security: a data-driven activation guid...
cybersecurity insiders 2022 vpn risk report...
untethered: how cios and cisos are paving the wa...
how companies reduce costs with the one true zero ...
zscaler delivers on the promise of the zero trust ...
busting 9 myths about file-based threats...
All
Security
role of cybersecurity in securing b2b domain from ...
cybersecurity in b2b – challenges, solution and ...
a close view into network security management tips...
protect your business: top reasons why cybersecuri...
use of ai in cybersecurity in 2023...
5 reasons data compliance will get more attention ...
a comprehensive guide on ot security...
ransomware – the rising global threat!...
using a real-time data platform to combat financia...
zero trust - shield better with this business secu...
cyber insurance – the lifeline for your business...
meeting data challenges with dpaas...
five cloud security challenges your business can f...
how ai and machine learning are redefining the phi...
meeting the cybersecurity challenge...
a comprehensive guide to zero-knowledge proofs (zk...
preparing for new deepfake threats...
essential elements of cyber security – ii...
essential elements of cyber security – i...
everything you need to know about data sovereignty...
All
Security
cisco purchases armorblox to improve cybersecurity...
halcyon and ciso global partner to mitigate extort...
cohesity increases google collaboration, introduce...
new concentric ai can find hardcoded secrets and k...
an attacker accesses a microsoft vm by using the a...
1password unveils passage to build passkey verific...
stacklok announces a usd 17.5 m series a to safegu...
island releases its updated enterprise browser to ...
security experts identify potential threats to new...
ibm buys polar security, a data security platform ...
report: one unpatched vulnerability raises cyber i...
report shows 900% increase in shadow api usage...
cloudflare protects ip and customer data using ai ...
cisa warns of multiple old linux vulnerabilities u...
google extends its dark web reporting service for ...
squarex secures usd 6 m for its browser security s...
new okta services help organizations improve ident...
absolute software will be acquired by crosspoint c...
quest software’s new release safeguards against ...
aws open-sources 2 new projects...
All
Security
new searchlight security module brings extra intel...
data privacy best practices every business should ...
Home
Page 2
Search Results for:
OT security providers
Meeting the Cybersecurity Challenge
Insights Desk
Oct 25, 2022
Highlights: Today's cyber threats and problems are even more challenging with IT trends like the widespread use of the cloud, DevOps methods, and the shortening of development cycles. Holistic...
Google Launches Open-Source Security Solution to Centralizes SBOM Administration
Insights Desk
Oct 21, 2022
Highlights: Users can utilize GUAC to query metadata, such as scorecard papers, SLSA provenance, and SBOMs, to confirm the security and integrity of their software supply chain. The developme...
Sophos Releases Third-party Security Support for its MDR Solution
Insights Desk
Oct 19, 2022
Highlights – As a component of the Sophos Adaptive Cybersecurity Ecosystem, the new third-party support incorporates telemetry from third-party endpoints, cloud, firewalls, identity, email, and...
Google Rebrands Siemplify to Chronicle Security Operations
Insights Desk
Oct 12, 2022
Highlights: The new set of solutions will enable organizations to gather threat data from sources like VirusTotal and Google Cloud's threat intelligence to provide more transparency into security...
Report: 76% of Organizations Had an API Security Incident Last Year
Insights Desk
Oct 11, 2022
Highlights: APIs are the lifeblood of digital transformation and the core of company development and innovation plans. While 76% of respondents claimed they had had an API security problem, th...
Elastic Automates Security with SOAR
Insights Desk
Aug 25, 2022
Highlights: Elastic, a provider of SIEM technology, just made the announcement that it would be releasing Elastic Security 8.4, which will have new native security, orchestration, automation, and...
Black Hat 2022 Reveals Trends in Enterprise Security
Insights Desk
Aug 18, 2022
Highlights: At Black Hat 2022, more than 300 cybersecurity manufacturers displayed and a majority of new product announcements were focused on API security. A separate session on SAP’s propr...
AWS, Splunk, and Others are Launching Open-source Cybersecurity Data Framework
Insights Desk
Aug 12, 2022
Highlights – By streamlining one of the most challenging facets of the task — data management — OCSF aims to assist businesses in responding to cyberattacks more successfully. OCSF offe...
Gartner Unveils Top Cybersecurity Predictions for 2022-23
Insights Desk
Jun 24, 2022
Highlights – The report is a harsh reminder for all the IT and cybersecurity teams that the threat landscape is very much real and changing faster than most organizations can react. These ei...
Report: Organizations Have a False Sense of Security About APIs
Insights Desk
Jun 20, 2022
Highlights: Considering that API traffic grew 321% the previous year and API traffic increased by 681%, organizations must be prepared to diminish API-level threats to protect their data. The ...
Posts navigation
Prev
1
2
3
…
16
Next
Whitepapers
News
Insights
Cloud
Finance
IT Infra
Best Practices
Security
Security
Security