Personal information such as private addresses and email addresses were vulnerable to exposure in one the world’s most trending apps Check Point Research uncovered multiple...
The acquisition of Symantec will enhance Accenture Security’s ability to help companies rapidly anticipate, detect and respond to cyber threats. Accenture has acquired Symantec’s Cyber...
Prama Hikvision booth at IFSEC India 2019 that exhibited its latest products and solutions, got an overwhelming response from the security professional community. Prama Hikvision...
Microsoft conducts a study to understand the affects of using old PCs and OS on SMBs, reveals exposure to security vulnerabilities and loss of productivity. ...
Sophos’ new threat hunting, detection and response offering is powered by ML and expert analysis to neutralize the most advanced cybersecurity threats. Sophos has launched...
Forcepoint’s cybersecurity landscape predictions span across topics such as attacker techniques, communication platforms, infrastructure adoption, data protection legislation and cybersecurity strategies. Forcepoint has unveiled its...
Trend Micro solutions helps in threat hunting and provided them with real-time network forensic analysis for various security incidents. Trend Micro Incorporated offers advanced security...
The Spirent-Fortinet technology alliance enables threats emulated by CyberFlood to be correlated with events identified by Fortinet, highlighting security holes. Spirent Communications has integrated its CyberFlood...
Earlier this year, Palo Alto Network suffered a security breach that has now been publicly acknowledged. The sensitive information of its employees was exposed online...
Attended by over 50 ITDMs, the Crayon-IBM’s ‘Enterprise Security Conclave’ was aimed to educate them on cloud security and emphasize the need for ‘Endpoint Management’...