
Thales covers data security entirety thanks to Imperva
A year and a half after Thales acquired data and application security company Imperva, the two technologies h...
A year and a half after Thales acquired data and application security company Imperva, the two technologies h...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
HashiCorp launched a free beta version of HCP Boundary. The solution allows organizations to secure user acce...
Security experts from Lookout disclosed new information regarding Android spyware used in targeted assaults b...
The peer-to-peer Panchan malware spreads throughout educational institutes using Linux servers to mine crypto...
Customers with a Microsoft 365 Personal or Family subscription can now secure multiple devices through Micros...
Several security companies are dissatisfied with Microsoft's patch policy. The tech giant allegedly undermine...
More and more security professionals consider a career switch. Simultaneously, nearly half of all Dutch IT se...
Microsoft is acquiring Miburo, an anti-disinformation specialist. The tech giant wants to better combat cyber...
Cloudflare recently repelled the largest HTTPS DDoS attack of all time. The attack executed as many as 26 mil...
Splunk has announced innovations for its platform during its .conf conference. The updates aim to improve obs...
German researchers captured WiFi connection probe requests from passersby to ascertain the data sent without ...