Browsing Category
Featured News
Attains Skyhigh Security Status of AWS Security Competency
Today, Skyhigh Security announced that company has attained the level of Infrastructure Security category Amazon!-->…
In Support of Cybersecurity Maturity-Based Approaches
The McKinsey article "The risk-based approach to cybersecurity" caught my attention and is worth discussing. The!-->…
Voice assistant devices can be secretly controlled by hackers using ultrasonic…
By sending ultrasonic waves through solid materials, researchers have found a new way to attack voice-controlled!-->…
Cartersville City paid a $380,000 ransom to have file access restored.
Cartersville, Georgia, paid a ransom of $380,000 to restore access to their files, according to city officials,!-->…
When Cybercriminals Turn to SMS, BEC Goes Mobile
The phrase "business email compromise" (BEC) refers to a range of methods and strategies used by hackers to trick!-->…
The Top 5 Features of Enforced Encryption
Lately, companies of all sizes have prioritized data security due to the ever-tightening requirements on data!-->…
For business clients, RemotePC is providing a high-performance remote desktop…
One of the quickest and most dependable remote desktop services available, RemotePC, is now providing enterprise!-->…
Fortinet Prioritizes Business Development to Promote Innovation in Cybersecurity
Leading cybersecurity company Fortinet is going after high-growth areas with a business plan that prioritizes!-->…
Palo Alto Networks announces its intention to purchase Dig Security, a cloud…
The leader in worldwide cybersecurity, Palo Alto Networks (NASDAQ: PANW), today announced that it has finalized an!-->…
Darktrace Unveils New Cloud-Native Security Solution Using AI to Provide Real-Time…
A new Darktrace/Cloud solution built on its exclusive Self-Learning AI was announced today by Darktrace, a leader!-->…