SPONSORED: WATCH NOW -- The COVID-19 pandemic has accelerated an ongoing shift in data away from business data centers to home offices and the cloud, explains Candid Wuest, VP...
Read moreAssuming employees want to steal trade secrets pits them against your security teams, creates stress and reduces productivity.
Read moreOn the heels of the Colonial Pipeline attack, the US Department of Homeland Security aims to force a reticent industry to improve its ability to detect and respond to...
Read moreSPONSORED: WATCH NOW -- Mobile devices like smartphones and tablets have emerged as popular targets for bad actors looking to break into to cloud-based networks, according to Poornima DeBolle,...
Read moreProlonged exposure to poorly managed legacy IT devices proves time and time again the familiar adage: What can go wrong will go wrong.
Read moreSPONSORED: WATCH NOW -- How do SOC professionals build a strategy when they lack basic information about how such threats operate? Advanced threats by their very nature create plenty...
Read moreNew study shows sharp increase in number of endpoint devices with sensitive data on them.
Read moreGoogle Discovers New Rowhammer Attack Technique
May 26 2021Researchers publish the details of a new Rowhammer vulnerability called "Half-Double" that exploits increasingly smaller DRAM chips.
Read moreZscaler Buys Deception Technology Startup
May 26 2021ZScaler's CEO says Smokescreen Technologies' capabilities will be integrated with Zscaler's ZIA and ZPA products.
Read more
Recent Comments