CoSoSys, announced that it had been named a Leader in Data Security by G2. G2 is the world’s largest peer-to-peer software review site, featuring thousands...
Data Theorem launched Supply Chain Secure, the industry’s first attack surface management (ASM) product to address software supply chain security threats across the application full-stack of...
Akamai Technologies, Inc., and Fujitsu Australia and New Zealand have entered a strategic relationship to assist organisations in Australia to defend against the threat of ransomware...
IoT is everywhere. From smart light bulbs to IP cameras, wearables, and even smart kitchen appliances, IoT provides benefits for any organization as it enables...
Five Steps For Reducing Your Company’s Cloud Attack Surface written by Puneet Gupta, Executive Director and Country Head – India, Virsec at VIRSEC where he...
CrowdStrike, introduced new adversary-focused Cloud Native Application Protection Platform (CNAPP) capabilities to accelerate threat hunting for cloud environments and workloads and reduce the mean time...
New Report Details Wiper Malware Aimed at Ukraine and Upsurge in Cyber Threats from Likely Russian-backed Actor in the Fourth Quarter of 2021 As per...
Trellix, released its Threat Labs Report: April 2022, examining cybercriminal behavior over the last six months. Key findings from the report include individual consumers being...
Forcepoint is delivering greater personalization and automation to DLP policy enforcement while also directly addressing the huge data growth problems organizations of all sizes are...