Browsing Category
Cybersecurity
The Need for Automated Remediation in SaaS Security
By Noam Shaar, Co-Founder & CEO, Wing Security
For years organizations were leveraging more and more…
AI for Cyber Threat Intelligence – Challenges and Mitigation…
By Uday Kiran Pulleti, Senior Director – AI, Cyble
The internet as we know it is a dynamic, constantly growing entity. In…
Critical Vulnerability Found in Motorola’s Unisoc Chips
Cyber-threat intelligence firm Checkpoint Research (CPR) spotted a critical vulnerability in the Unisoc Tiger T700 chips that…
State-Backed Hacker Believed to Be Behind Follina Attacks on EU and US
An unnamed state actor is reportedly behind a phishing campaign targeting European and local US government entities using the …
Gloucester Council IT Systems Still Not Fully Operational Six Months After…
Gloucester City Council’s IT systems are still not fully operational almost six months after it was targeted by Russian hackers.…
Russian Ministry Website Reportedly Hacked
Russia’s Ministry of Construction, Housing and Utilities website has been reportedly hacked, with an internet search for the site…
Protect Your Executives’ Personal Digital Lives to Protect Your Company
By Dr Chris Pierson, BlackCloak Founder & CEO
Earlier this year, news broke that Chinese hackers had been caught sending…
Need Micro-segmentation Superpowers? Visit ColorTokens at RSA
How ColorTokens’ Xshield is a game-changer for Zero Trust micro-segmentation and cloud migration security, enabling…
How SD-WAN Enables Digital Transformation
By Timothy Liu, CTO & Co-founder, Hillstone Networks
While Software-Defined Wide Area Networking, or SD-WAN, has…
Alert Fatigue Puts Your Organization at Risk; Here’s What to do about it
By Derek Nugent, Vice President Sales, Marketing & Customer Success at Difenda
Alerts, notifications, and non-stop calls…