Browsing Category
Article
The Benefits of and How to Create a Compliance Program
We still cannot ensure that a cyberattack or breach can be readily prevented, even in today's technologically!-->…
The Identity Problem: How Are Banks Able to Identify Individuals?
Technology has completely changed the banking industry by introducing a plethora of new services and altering the!-->…
Exposure to cryptojacking malware compromises Docker deployments
Attackers are installing and using cryptojacking malware on servers by taking advantage of Docker Engine!-->…
What is data masking in the context of cybersecurity, and which platforms are best…
Although it may seem unrealistic, data masking—a formal term for the addition of functional value to the same set!-->…
Data Loss Prevention Needs to Be Redefined ASAP to Address Growing Global Data…
Protecting data from external threats and internal vulnerabilities is paramount to ensuring businesses' smooth and!-->…
Together, Cequence and Vercara will fight cyber threats and transform API…
The innovative Unified API Protection (UAP) platform from Cequence Security and Vercara, a leading provider of!-->…
A New K-12 ThreatDown Bundle from Malwarebytes Protects Schools and Districts…
A global leader in real-time cyber protection, Malwarebytes today announced the release of ThreatDown K-12 Bundle,!-->…
A More Aggressive Cybersecurity Approach Provides More Protection and Information
There are two approaches to cybersecurity: the reactive approach, which is implemented after security protocols!-->…
The latest NIST security guide, open CRS, GSA spin-up portal offerings and more
Guidance on identity management for electric firms is being sought after by NIST. Comments are being accepted on a!-->…
VIAVI’s Observer Platform Innovations Increase Visibility Throughout…
With the major improvements to the Observer Platform that Viavi Solutions Inc. (VIAVI) (NASDAQ: VIAV) announced!-->…