VELOCITY - DATA AND ANALYTICS SUMMIT

cyber security - search results

If you're not happy with the results, please do another search
The-Digital-Certificate-Conundrum

The Digital Certificate Conundrum

Attacks on the telecoms industry underscores the need for proper machine identity management Just last month, the US Cybersecurity and Infrastructure Security Agency (CISA) sent...
Drata-Adds-Risk-Management-Solution-to-Further-Integrate-Security-and-Compliance-Automation

Drata Announces The Launch Of Risk Management Solution

Drata, security and continuous compliance automation platform, announced the launch of Risk Management, enabling customers to manage end-to-end risk programs by continuously monitoring, identifying,...

Saudi Partners With Google To Empower 100 Technology Startups

The "Garage" project is the fruit of cooperation between the Ministry of Communications and Information Technology, King Abdulaziz City for Science and Technology, and...

What Is Bumblebee Malware Loader?

Cybereason issued a global threat report warning global organisations about a rise in ransomware attacks using the Bumblebee loader. The new research focuses on...

EY, Kyndryl Partner To Support Clients In Achieving Their Digital Transformation Goals

EY announces an alliance between Kyndryl, the IT infrastructure services provider, and Ernst & Young LLP, to support clients in achieving their digital transformation...
AI-Is-Critical-For-Network-Access-Control,-Here’s-Why

AI Is Critical For Network Access Control, Here’s Why

With traditional Network Access Control losing prominence amid current IT infrastructure, the time is ripe enough to complement NAC with the power of AI. Network...
New-approach-to-delivering-data-center-power-with-Ease

Eaton Introduces xModular System

The latest addition to its critical systems portfolio that brings innovation, integration and a digital dimension to the design, deployment, and operation of data...
Unlocking-Network-as-a-Service-Opportunities-In-The-Channel

Unlocking Network-as-a-Service Opportunities In The Channel

Covid-19 triggered a surge in interest in as-a-Service adoption across the IT industry. Unprecedented uncertainties and disruptions meant that companies came to value the versatility...
Trellix-Finds-Unauthenticated-Remote-Code-Execution-In-DrayTek-Vigor-Routers

Trellix Finds Unauthenticated Remote Code Execution In DrayTek Vigor Routers

Trellix Threat Labs is not currently aware of any signs of exploitation of this vulnerability in the wild; however, DrayTek devices were recently targeted...
What Is Darkverse_

What Is Darkverse?

Trend Micro Incorporated, a cybersecurity leader, released a new report warning of a "darkverse" of criminality hidden from law enforcement, which could quickly evolve...

Latest Posts