Security

Technology

Spot by NetApp Announces Continuous Cloud Security to Surface Organizations’ Most Critical Vulnerabilities

Spot Security identifies and assesses cloud security posture risks to help SecOps and CloudOps teams ensure continuous cloud security and…

Read More »
Technology

SIM Swapping and Cybercrime: Three Preventive Measures

Cybersecurity experts warn that mobile phone SIM swapping is on the rise but say it’s possible to avoid becoming a…

Read More »
Technology

A Traveller’s Guide to Staying Cyber-safe and Practising Proper Cyber Hygiene

By Jonas Walker, Security Strategist at FortiGuard Labs Jonas Walker, Security Strategist at FortiGuard Labs As Covid-19 infection rates shift…

Read More »
Technology

Amazon Prime Day or Crime Day? Phishing Scams, Warns Check Point

This year, during the first few days of July, Check Point Research (CPR) has already witnessed a 37% increase in…

Read More »
Technology

Fortinet Global Survey Uncovers Critical OT Security Challenges

93% of OT Organizations Experienced an Intrusion in Past 12 Months, and 78% Experienced More than Three Fortinet® (NASDAQ: FTNT), a…

Read More »
Business

Small and Medium Businesses (SMBs) and the Supply Chain Attacks

Cybersecurity readiness prevents small and medium businesses (SMBs) from fuelling supply chain attacks By Ram Narayanan, Country Manager at Check…

Read More »
Technology

From Bitcoin to the Metaverse: The Dangers Behind the Blockchain Evolution

On Bitcoin Day 2022, Check Point Software uncovers the security risks of the blockchain evolution and provides seven recommendations to…

Read More »
Technology

Cybersecurity Skills Gap Contributed to 80 Percent of Breaches According to New Fortinet Report

Fortinet Releases New Research on Key Concerns around the Cybersecurity Talent Shortage, Recruitment, Diversity, and Security Awareness Sandra Wheatley, SVP,…

Read More »
Technology

Check Point Research: Mobile Chipset Manufacturers used Vulnerable Audio Decoder, 2/3 of Android Users’ Privacy Around the World were at Risk  

Check Point Research discovered vulnerabilities in the ALAC format that could have led an attacker to remotely get access to…

Read More »
Technology

3 Key Components to Raising the Bar on Digital Acceleration

By Jonathan Nguyen-Duy, Vice President, Global Field CISO at Fortinet Jonathan Nguyen-Duy, Vice President, Global Field CISO at Fortinet Anyone…

Read More »
Back to top button

Adblock Detected

Please Turnoff the adblocker!