Researchers discover how to pinpoint the location of a malicious drone operator
Researchers at Ben-Gurion University of the Negev (BGU) have determined how to pinpoint the location of a drone operator who may be operating maliciously or harmfully near …
Global data center networking market to reach $40.9 billion by 2025
The global data center networking market is projected to reach $40.9 billion by 2025 and projected to register 11.0% CAGR over the forecast period, from 2019 to 2025 according …
Cyral ships zero trust data layer GA security platform
Cyral, provider of the first cloud security platform for the data layer, announced general availability of its data layer security platform. “Cyral pioneered the concept of a …
Ericsson’s new software enables 5G NR to operate independently of 4G networks
Communications service providers can now tap the full potential of 5G New Radio (NR) technology with the commercial availability of Ericsson Standalone 5G NR software for 5G …
NewDay selects RSA Adaptive Authentication for eCommerce to protect digital payments from fraud
RSA announces that NewDay has selected and deployed RSA Adaptive Authentication for eCommerce to deliver advanced fraud protection for digital payments and address the …
V-Key’s V-OS receives Common Criteria EAL rating of 3+
V-Key announced that V-OS, V-Key’s core patented technology, is the world’s first virtual secure element to receive a Common Criteria Evaluation Assurance Level (EAL) rating …
Attackers are breaching F5 BIG-IP devices, check whether you’ve been hit
Attackers are actively trying to exploit CVE-2020-5902, a critical vulnerability affecting F5 Networks‘ BIG-IP multi-purpose networking devices, to install coin-miners, …
Data exfiltration: The art of distancing
We have all seen the carefully prepared statement. A cyber incident has occurred, we are investigating but please do not worry since no data has left our network. Perhaps we …
Cybersecurity software sales and training in a no-touch world
The pandemic has led to an outbreak of cybercriminal activity focused on remote workers and enterprises that needed to quickly migrate to the cloud to maintain business …
Review: Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains, who formerly held many essential roles at Microsoft and is currently working at Amazon Web Services as Regional Leader for Security and Compliance Business …
Managers and employees support digital transformation, but see room for improvement
Digital transformation has widespread support among managers and employees, but some think that the pace of change at their companies could be faster, they could be more …
Zettaset’s encryption solutions now available on VMware Cloud Marketplace
Zettaset announced the availability of its encryption solutions on VMware Cloud Marketplace. Zettaset XCrypt Kubernetes & Container Encryption and XCrypt Virtual Key …
Featured news
Resources
Don't miss
- How AI is reshaping attack path analysis
- What happens when cybersecurity knowledge walks out the door
- AI-driven scams are eroding trust in calls, messages, and meetings
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform