Browsing Category
Cybersecurity
Getting AI Right for Security: 5 Principles
By Kevin Kennedy, SVP Products, Vectra AI
Now more than ever, companies need effective security solutions. The cost of global…
From Virtual Visions to Tangible Profits: A Founder’s Guide to…
By Caroline McCaffrey, CEO and Co-founder, ClearOPS
Most people find themselves in cybersecurity because they find its…
From the SIEM to the Lake: Bridging the Gap for Splunk Customers…
By Omer Singer, VP of Strategy, Anvilogic
The smoke has cleared on Cisco’s largest acquisition ever: that of Splunk for $28…
It’s Time to End the Myth of Untouchable Mainframe Security.
By Al Saurette, CEO, MainTegrity,
Most large organizations, including 70% of Fortune 500 companies, rely extensively on…
New Ivanti Vulnerability Observed as Widespread Security Concerns Grow
Read more on Ivanti vulnerabilities:
Bad news continues to pile up for Utah-based IT software provider Ivanti as a new…
How Businesses Can Manage Cryptocurrency Fraud
With cryptocurrency payments on the rise, businesses must learn how to safeguard against potential risks.
By James Hunt, Subject…
Enhancing PCI DSS Compliance: The Urgent Need for Risk-Based Prioritization
By Ian Robinson, Chief Architect of Titania
Keeping U.S. commercial critical national infrastructure (CNI) organizations safe is…
Hackers Exploit EU Agenda in Spear Phishing Campaigns
Organizations based in the EU are being targeted by spear phishing campaigns leveraging EU political and diplomatic events,…
PDF Malware on the Rise, Used to Spread WikiLoader, Ursnif and DarkGat
PDF threats are on the rise with cybercriminals spreading malware, including WikiLoader, Ursnif and DarkGate, through PDFs, a new…
Google Warns Unfair AI Rules Could Empower Hackers
Google has called for a balanced regulatory approach to AI in order to avoid a future where attackers can innovate but defenders…