Internet Security

Is Cybersecurity Expertise Evolving with Remote Work and Advanced Tech?
Infrastructure & Network Security Is Cybersecurity Expertise Evolving with Remote Work and Advanced Tech?

The cybersecurity landscape is undergoing significant transformations, driven by the rise of remote work and the integration of advanced technologies. As organizations adapt to these changes, the demand for specialized cybersecurity expertise has surged, reflecting the need for robust digital

How Does Thales's New Solution Enhance Data Security Management?
Data Protection & Privacy How Does Thales's New Solution Enhance Data Security Management?

Thales has officially launched Data Risk Intelligence, a cutting-edge solution designed to identify and address threats to sensitive data, leveraging the highly-regarded Imperva Data Security Fabric (DSF) and Thales’s own CipherTrust Data Security Platform. This innovative offering is the latest r

Telco Security Crisis: Urgent Action Needed to Counter Chinese Espionage
Infrastructure & Network Security Telco Security Crisis: Urgent Action Needed to Counter Chinese Espionage

In an era where cybersecurity is a top priority for nations worldwide, the glaring vulnerabilities in telecommunications (telco) security are emerging as a significant concern. The situation has reached critical levels, especially with reports of deep infiltration by Chinese state hackers into the

Bing Wallpaper App Sparks Privacy Fears, Compared to Malware by Experts
Infrastructure & Network Security Bing Wallpaper App Sparks Privacy Fears, Compared to Malware by Experts

The introduction of the Bing Wallpaper app to the Microsoft Store, aimed at simplifying its download and installation process for Windows 11 users, has spurred significant privacy concerns among the tech community. While it appears to be a seemingly harmless addition, further investigation has

How Did a Ransomware Attack Disrupt Blue Yonder's Supply Chain Services?
Infrastructure & Network Security How Did a Ransomware Attack Disrupt Blue Yonder's Supply Chain Services?

The recent ransomware attack on Blue Yonder, a supply chain management SaaS provider, had a profound impact on its managed services hosted environment, affecting many of the company's 3,000 customers spread across 76 countries. The attack, which was publicly disclosed on November 21, has

How Does Push Security’s New Feature Tackle False Positives in Cybersecurity?
Infrastructure & Network Security How Does Push Security’s New Feature Tackle False Positives in Cybersecurity?

In the ever-evolving landscape of cybersecurity, managing false positives in threat intelligence remains a persistent and formidable challenge for security teams. Security teams often find themselves inundated with alerts, many of which turn out to be false alarms, resulting in decreased efficiency

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later