Your Trusted Source for Security News

Editorial

View All
Your Trusted Source for Security News
Editorial Endpoint Security as a Strategy for Modern Threats

The old security playbook is failing. For years, organizations built digital fortresses, believing that a strong perimeter firewall and traditional antivirus software were enough to keep threats at…

Securing Attack Surfaces: A Strategic Approach to Mobile Risk
EditorialSecuring Attack Surfaces: A Strategic Approach to Mobile Risk

97% of executives use personal devices to access their work accounts, but these aren’t designed to

Can You Stop a Breach in Less Than 18 Minutes?
EditorialCan You Stop a Breach in Less Than 18 Minutes?

How long does it take for a threat actor to move from initial compromise to lateral movement within

Security Service Edge Is a Strategy, Not a Product
EditorialSecurity Service Edge Is a Strategy, Not a Product

The traditional security perimeter is gone. It was not breached by a single attack but dissolved by

Zero Trust’s Reality Check for Legacy Systems
EditorialZero Trust’s Reality Check for Legacy Systems

The castle-and-moat security model is obsolete. For years, security leaders have heard the same

View All

Data Protection & Privacy

View All
View All

Infrastructure & Network Security

View All
View All
Nvidia Invests $4 Billion to Secure AI Networking Future
Infrastructure & Network Security Nvidia Invests $4 Billion to Secure AI Networking Future

The global race to achieve artificial intelligence at a planetary scale has shifted from a battle of individual processor speeds to a desperate contest over how efficiently those processors can talk to one another. While the mainstream tech press remains fixated on the raw power of the latest

Chrome Overhauls HTTPS Security for the Quantum Era
Infrastructure & Network SecurityChrome Overhauls HTTPS Security for the Quantum Era

Rupert Marais stands at the forefront of the next great evolution in digital security as Google’s

Why Is It Time to Modernize Your Identity Governance?
Infrastructure & Network SecurityWhy Is It Time to Modernize Your Identity Governance?

The rapid acceleration of digital business initiatives has left many traditional security

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later