
SentinelOne joins AWS ISV program to secure software migrations
When customers want to migrate software from other cloud environments or on-premises environments to AWS, the...
When customers want to migrate software from other cloud environments or on-premises environments to AWS, the...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Trend Micro researchers say they found a new malware that uses Slack channels, GitHub, and file.io to steal da...
In Jackson County, Georgia, no less than 400,000 dollars (355,624 euros) was paid to cyber criminals. This put...
Thales and Gemalto have been granted an antitrust exemption in the United States. Earlier this month, the two ...
Security researchers Bob Diachenko and Vinny Troia have discovered a publicly accessible database owned by an ...
Gemalto has expanded its Cloud HSM On Demand portfolio with three new solutions. These are HSM On Demand for C...
The number of cyber attacks worldwide has quadrupled in the second half of 2018 compared to the first half of ...
Cisco has advised owners of Nexus switches to disable a feature called PowerOn Auto Provisioning (POAP) for se...
Google has added more security features to its cloud platform. These include the Web Risk API, which is a serv...
Every year, Microsoft publishes the Security Intelligence Report. This year, the report reaches its twenty-fou...
The fraudulent killer malware code called Triton can disable security systems that prevent catastrophic indust...