HPE embeds security in network even more with SRX400 and AI governance
HPE’s goal regarding the topics discussed at the RSAC 2026 Conference in San Francisco is clear: it wants t...
HPE’s goal regarding the topics discussed at the RSAC 2026 Conference in San Francisco is clear: it wants t...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Splunk is releasing new functionality for its Security and Observability Cloud. This is to help companies bec...
Developers are being attacked by threat actors using "sophisticated typosquatting techniques". Threat acto...
The breach compromised some of Ferrari's IT systems, after which the company received a ransom demand from ha...
Only 8 percent of organizations in the Netherlands are prepared for modern cyber security threats, according ...
The move intends to bypass Microsoft security restrictions and infect more targets. Emotet is a notorious mal...
Zscaler has added new functionality to Posture Control for securing applications. Data loss prevention (DLP) ...
NordPass, part of NordVPN, is announcing the development of its new password storage solution: NordPass Passk...
The Managed Workspace Protection and Managed Threat Detection services are designed to help businesses across...
The flaws could compromise certain Samsung chips in dozens of Android models, wearables, and vehicles. Projec...
Users of mobile devices are increasingly at risk of phishing when they scan fraudulent QR codes. There are al...