
Zscaler Cellular brings Zero Trust to IoT and OT devices
In August, Zscaler will launch a cellular solution that brings Zero Trust security to IoT and OT devices. Wit...
In August, Zscaler will launch a cellular solution that brings Zero Trust security to IoT and OT devices. Wit...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Acronis extends access to Acronis Cyber Protect through a beta version now available to all IT teams. With...
Multistage ransomware attacks on vital infrastructure providers are becoming more dangerous and frequent, acc...
Working from home has a significant impact on the risks to which company systems and sensitive data are expos...
GitLab acquires software developer Peach Tech and fuzz testing vendor Fuzzit. With these acquisitions, Gitlab...
Homeland Security advises Windows 10 users to install the latest version of the operating system as soon as p...
Zscaler acquires American security specialist Edgewise Networks for an undisclosed amount. Edgewise provides ...
US security company WatchGuard Technologies has completed the acquisition of Panda Security. Panda is a speci...
Many companies have inadequate security measures in place to support remote workers. This is revealed in the ...
Akamai introduces the AI-based Page Integrity Manager tool to help companies discover malicious code on their...
The majority of critical vulnerabilities in Google Chrome are attributed to faulty memory usage, Google techn...