cyber security - search results
If you're not happy with the results, please do another search
Enterprise Telephony Systems Are Highly Susceptible To Telecom Fraud
Datatechvibe spoke with Arnd Baranowski, CEO at Oculeus, about how telecom fraud evolved, the type of voice communication services highly exposed to fraud, its...
GITEX Global 2022: Trend Micro To Present The Power Of One
Aiming to bolster digital experiences in the region, the company will demonstrate an array of the most powerful, multi-layered security solutions across the cloud,...
UAE-based VAD Starlink Announces Merger With Infinigate
Swiss-based value-added distributor of cybersecurity solutions has merged with UAE-based StarLink to create a new entity with revenues of $2.18 billion.
Under the deal, Starlink...
SentinelOne Partners With Perception Point
Perception Point, a provider of advanced threat protection across digital channels announced that it has partnered with SentinelOne, an autonomous cybersecurity platform company, to...
Trellix Accelerates Channel Success Through Unified Partner Program
Trellix Reaffirms Commitment to Channel-First Strategy and Strengthens Open XDR Ecosystem
Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), has...
Cybeats Partners With Veracode
Cybeats Technologies Inc, a software supply chain risk and security technology provider, announces a strategic partnership with Veracode, a leading global provider of application...
September Tech Roundup: All The Tech News You Need To Know
Our monthly list of carefully selected news stories ensures that you don't miss out on technology advancements.
September has been a month of technological advancement...
Vectra AI To Showcase Power Of Attack-signal Intelligence At GITEX 2022
The company will show how its Threat Detection and Response (TDR) and Managed Detection and Response (MDR) suites can deliver actionable intelligence that reduces...
What You Need To Know About Phishing Attacks
Phishing is a type of social engineering technique and one of the most common forms of cyberattacks. Phishing is spread via emails, scam websites,...
Do Not Ask Permission To Innovate
If you face resistance from colleagues or the status-quo it will be a sign you are doing your job, says Pablo Olivera Brizzio, Director...