Latest episode - listen now!
Read moreBased on the reaction of a single insect in a swarm, messages are passed along peer to peer, and an entire environment can respond without a central leader processing...
Read moreResearch shows that multiple attack groups have been using the Microsoft file-sharing service - leveraging phishing kit for much longer than previously thought.
Read moreArtificial Intelligence and Machine Learning, Cloud Computing, and 5G Will Be the Most Important Technologies in 2022, Says New IEEE Study
November 18 2021Chief information officers, chief technology officers, and technology leaders globally surveyed on key technology trends, priorities, and predictions for 2022 and beyond.
Read moreGBG Announces It Has Agreed to Acquire Acuant
November 18 2021GBG announces it has agreed to acquire Acuant, bringing together two leaders in the global digital identity market with combined revenue of c.£265 million.
Read moreTech CEO Pleads to Wire Fraud in IP Address Scheme
November 17 2021The CEO of a South Carolina technology firm has pleaded guilty to 20 counts of wire fraud in connection with an elaborate network of phony companies set up to...
Read moreTech CEO Pleads to Wire Fraud in IP Address Scheme
November 17 2021The CEO of a South Carolina technology firm has pleaded guilty to 20 counts of wire fraud in connection with an elaborate network of phony companies set up to...
Read moreCISA Releases Incident and Vulnerability Response Playbooks to Strengthen Cybersecurity for Federal Civilian Agencies
November 17 2021Effort part of President Biden’s executive order to improve the nation’s sybersecurity.
Read moreSift Acquires Passwordless Authentication Pioneer Keyless to Provide Secure, Frictionless Authentication
November 17 2021Biometric authentication innovator eliminates password-based account takeover and enables PSD2 Strong Customer Authentication while preserving user privacy.
Read morePalo Alto Networks Delivers What’s Next in Security at Ignite ’21
November 17 2021Cybersecurity company introduces solutions aimed at network security, cloud security and security operations.
Read more
Recent Comments