Does Sunburst Have Your Confidential Emails and Database Data?

By Randy Reiter CEO of Don’t Be Breached So far three malware strains have been identified in the SolarWinds supply chain attack. They are the SUNBURST, SUPERNOVA, and TEARDROP malware […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on Does Sunburst Have Your Confidential Emails and Database Data?

5G Security

Towards trustworthy products for resilient networks By David Soldani, CTSO, Huawei Technologies   5G technologies will be applied to many vertical industries and support various usage scenarios, such as applications […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on 5G Security

The 2021 Perspective – Challenges and Milestones for The VPN Industry

By Sebastian Schaub, CEO and Co-Founder, hide.me VPN The worldwide VPN market is conservatively valued at over $20 Billion and is predicted to nearly double in value over the next […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , | Comments Off on The 2021 Perspective – Challenges and Milestones for The VPN Industry

How Blockchain Is Helping Stop the Spread of COVID-19

By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on How Blockchain Is Helping Stop the Spread of COVID-19

How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night

Financial institutions, like eCommerce industries, are leading today’s fast, pandemic-driven transition to the digital space. A change that will become a norm. By Robert Capps, VP of Marketplace, NuData, a […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , , , | Comments Off on How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night

Why Endpoint Protection Should Be a Security Priority

Understanding common endpoint protection mistakes will better prepare your business to combat cyber threats By JG Heithcock, General Manager of Retrospect, Inc., a StorCentric Company For many small to medium-sized […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Why Endpoint Protection Should Be a Security Priority

Fast and Secure Connectivity from Anywhere, Designed for Financial Institutions

Provide Users Fast and Secure Connectivity from Anywhere with the Leading SASE Platform Based on Containerization for Complete Data Isolation With increasing bandwidth, encrypted traffic, shifts to cloud applications like […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Fast and Secure Connectivity from Anywhere, Designed for Financial Institutions

Acronis Cyber Readiness Report

Pandemic reveals cybersecurity gaps, need for new solutions By Peter Hale, Sr. Content Manager, Acronis As businesses around the world reacted to the COVID-19 pandemic, many had to address new […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Acronis Cyber Readiness Report

Building Secure Software Right from the Start: Four Steps for an Effective AppSec Strategy

By Joanne Godfrey, Security Evangelist, ZeroNorth Companies are rushing to launch digital transformation initiatives and roll out new software products and services at a greater speed than ever before. But […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Building Secure Software Right from the Start: Four Steps for an Effective AppSec Strategy

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X