Axis Communications builds cyber wall around popular IoT devices
Securing IoT devices must be a top priority from start to finish these days. Whereas the issue used to be see...
Securing IoT devices must be a top priority from start to finish these days. Whereas the issue used to be see...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
BeyondCorp Enterprise is now generally available to Google Cloud customers. This week Google Cloud announc...
The move will expand the company's cybersecurity service offering. This week Deloitte & Touch announce...
The new threat is a variant on previous malware from 2019. Zscaler’s ThreatLabZ research team have recen...
Security researchers have revealed that a ransom DDoS campaign is underway, targeting organizations all over ...
Distributed denial-of-service (DDoS) malefactors are abusing the Microsoft Remote Desktop Protocol (RDP) to i...
The latest version of Microsoft's web browser has new encryption technology to protect users online. This ...
Trend Micro has announced a new security solution. Cloud One - Container Security aims to simplify applicatio...
A recent survey says that organizations forsake security concerns in the development of applications and APIs...
Users yet again turn out to be the weakest link in the security of computer systems. This is suggested by a s...
The change to a key setting is designed to limit the damage that an infection can cause in an enterprise sett...