Data Privacy & Security

Google Gemini AI Tools Now Integrated Into Workspace Business Plans
Infrastructure & Network Security Google Gemini AI Tools Now Integrated Into Workspace Business Plans

Google has recently expanded the availability of its AI tool, Google Gemini. This move integrates Gemini into Google Workspace for Business, Enterprise, and Frontline plans, marking a significant milestone in AI-driven business operations. These enhancements are aimed at bolstering customer

ArmorCode Enhances ASPM Platform with New AI Modules for Security Teams
Infrastructure & Network Security ArmorCode Enhances ASPM Platform with New AI Modules for Security Teams

In today's fast-paced digital world, application security is a top priority for organizations aiming to protect their data and infrastructure from potential threats. Recognizing the importance of efficient vulnerability management, ArmorCode has expanded its AI-powered Application Security Posture

How Does Capgemini's 'Shared Fate' Boost Cloud Security with GCP?
Infrastructure & Network Security How Does Capgemini's 'Shared Fate' Boost Cloud Security with GCP?

In today's digitalized world, the necessity for robust cybersecurity measures cannot be overstressed. With the rise of sophisticated cyber threats and the integration of generative artificial intelligence (Gen AI) into everyday business operations, security has become more complex than ever.

Surge in Mobile Phishing Demands Robust Enterprise Security Measures
Endpoint & Device Security Surge in Mobile Phishing Demands Robust Enterprise Security Measures

Mobile phishing and other malicious activities targeting enterprise environments have surged alarmingly. The Lookout Mobile Threat Landscape Report for Q2 2024 has shown a dramatic increase in mobile threats, evidencing a 70% year-over-year (YOY) rise in phishing attempts aimed at mobile devices.

How Will the Proofpoint-CyberArk Partnership Secure Your Identity?
Identity & Access Management How Will the Proofpoint-CyberArk Partnership Secure Your Identity?

The digital transformation of businesses and the increasing complexity of cyber threats have shifted the need for more robust and adaptive security measures. Traditional endpoint and network defenses alone are no longer sufficient; instead, identity-centric security measures have become crucial.

Was Your Social Security Number Stolen in the National Public Data Hack?
Identity & Access Management Was Your Social Security Number Stolen in the National Public Data Hack?

In today's increasingly interconnected world, the integrity of our personal information is more vulnerable than ever. The recent National Public Data breach serves as yet another stark reminder of this reality, affecting potentially billions of personal records. Understanding how to mitigate the

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later