Latest
HP Warns of Cat-phishing by Threat Actors Through Deceiving Links
Palo Alto Networks and IBM Builds Security Partnership
Exabeam LogRhythm Merge for Enhanced AI-Driven Security Solutions
Infoblox Unveils Muddling Meerkat, Managing China’s Great Firewall
Zscaler AI Data Protection Platform Transforms Cybersecurity
Nozomi Networks and Mandiant Strengthen Bond to Foster Security
Precision AI Security Solutions Redefines Safety & New Standards
Akamai Technologies Acquisition of Noname Security for USD 500M
Synopsys’ Software Integrity Group Sale for USD 2.1B
Microsoft’s New Security Features Empower SOC in Defender XDR
Login
Login
Insights
cloud
solutions
virtualization
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
News
cloud
solutions
virtualization
digital
digital marketing
social media marketing
Finance
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
Whitepapers
All
Security
state of ransomware 2024...
endpoint best practices to block ransomware...
best practices for securing your network from rans...
security outcomes report volume 3: achieving secur...
hybrid firewall ck_toolkit_data center firewall...
analyst - gartner workload and network security hy...
use the 2023 mitre attck® evaluations results for...
automate security operations with the multilayered...
current security solutions and user training are n...
detendo adversários ativos...
detenga a los adversarios activos...
stopping active adversaries: lessons from the cybe...
guia da sophos para seguro de proteção digital...
guía de sophos sobre ciberseguros...
sb - simplify wired and wireless network security ...
industry insights – three ways fortinet hybrid m...
kmsat demo: new school security awareness training...
the real world: new-school security awareness trai...
critical considerations when choosing your securit...
2023 phishing by industry benchmarking...
All
Security
ensuring sox compliance for financial integrity d...
cyber hazard of rainbow table attacks compromising...
defending against password spraying: fortifying yo...
role of digital immune system in strengthening bus...
what is cybersecurity asset management & why i...
the growing threat of ai malware...
what is cyber espionage? attacks jeopardizing busi...
menace of ping flood attacks: a growing network pe...
explore reasons & steps to stop social enginee...
a comprehensive guide on saas risk management...
why is operational technology cybersecurity essent...
what are web application firewalls (wafs)? robust ...
code injection attacks: a guide to security preve...
understanding dictionary attacks in the intersecti...
a guide to cybersecurity asset management...
understanding operational technology security risk...
the best cloud security trends in 2024...
guide on what is zoombombing and preventive measur...
decoding smurf attacks: the concept, mechanics, im...
your go-to security information and event manageme...
All
Security
hp warns of cat-phishing by threat actors through ...
palo alto networks and ibm builds security partner...
exabeam logrhythm merge for enhanced ai-driven sec...
infoblox unveils muddling meerkat, managing china�...
zscaler ai data protection platform transforms cyb...
nozomi networks and mandiant strengthen bond to fo...
precision ai security solutions redefines safety &...
akamai technologies acquisition of noname security...
synopsys’ software integrity group sale for usd ...
microsoft’s new security features empower soc in...
microsoft’s new security features empower soc in...
microsoft’s new security features empower soc in...
oasis security’s series a expansion strengthens ...
dropzone ai cybersecurity funding reaches usd 16.8...
zscaler threatlabz 2024 phishing report flags ai's...
red hat updates trusted software supply chain to b...
wiz inc. acquisition negotiations to buy lacework ...
armis inc. acquires silk security inc. in a deal w...
vorlon secures usd 15.7m to address third-party ap...
akamai to acquire noname security reportedly for u...
All
Security
startup zero networks secures usd 20m...
new searchlight security module brings extra intel...
data privacy best practices every business should ...
Home
Page 32
Search Results for:
security compliance
Hitachi ID Bravura Group
Research Desk
May 14, 2021
Access Security Groups underpin security in most systems and applications. If users are assigned to the wrong groups, they can gain inappropriate access to applications or data, which can compromise t...
Core to Cloud Is Now a Part of Cylera’s Global Channel Partner Program
Insights Desk
May 10, 2021
Cylera, the foremost healthcare IoT (HIoT) cybersecurity and threat intelligence company, has announced the collaboration of Core to Cloud to the company’s Global Channel Partner Program. Core to...
ALTR, OneTrust Integrate to Provide Data Governance, Protection Solution
Insights Desk
Apr 22, 2021
ALTR, a top provider in advanced data security for data-driven enterprises, announced a partnership with OneTrust, a leading fastest-growing company on the Inc. 500 and category-defining enterprise p...
SafeGuard Cyber Secures USD 45 Million in a Financing Round Led by NightDragon
Insights Desk
Apr 19, 2021
SafeGuard Cyber is a major SaaS-based platform that protects the digital world by dealing with the end-to-end lifecycle of Digital Risk Protect. The company recently broke the news of obtaining USD 45...
Okta Introduces Two New Tools – Identity Governance Administration and Privileged Access Management
Insights Desk
Apr 17, 2021
Okta, the cloud-based management company, on April 07, 2021, announced the launch of two new products that will take the company across new markets. The first one is a new Privileged Access Management...
Microsoft Experiences Breach After SolarWinds Accessed Source Code for 3 Products
Insights Desk
Feb 26, 2021
The SolarWinds campaign has recently launched an attack from inside the United States to complicate US government efforts to observe their activity. The incident is recorded as one of the worst bre...
Baffle Introduced Data Protection Services for Amazon Redshift
Insights Desk
Feb 06, 2021
Baffle has announced its Data Protection Services (DPS) to support dynamic data masking, data de-identification, and adaptive data security controls for Amazon Redshift. Being the only solution,...
IDC Topline Report – UK
Research Desk
Dec 23, 2020
In this Topline report, IDC provide UK specific insights and guidance on how leveraging 5 key drivers, that are tied to business priorities such as compliance, reducing operating cost, improved accura...
Being Resilient: Assuring Digital Trust in the New World of Work
Research Desk
Dec 17, 2020
Recently, in just three weeks we moved 80 percent of our 240,000 employees - the world over - to securely work from their homes, and we are happy to share the learning from our experience. The challe...
CMMC Readiness Assessment
Research Desk
Dec 10, 2020
Organizations that intend to bid on Department of Defense (DoD) contracts must attest to their Cybersecurity Maturity Model Certification (CMMC) level. But is your organization prepared for the CMMC c...
Posts navigation
Prev
1
…
31
32
33
…
37
Next
Whitepapers
News
Insights
Security
Security
Security