Cisco’s three developments to transform customer experience with contact centers
The world’s best brands earn customer loyalty over years, even decades – only to lose it in a few seconds if the customer experience is not stellar. While customer needs …
F5’s NGINX Controller enhanced with configuration API, self-service, and app-centric capabilities
F5 Networks introduced NGINX Controller 3.0, a cloud-native application delivery solution to help organizations increase business agility, mitigate risk, and enhance their …
Cisco adds AI-powered voice intelligence capabilities to Webex Meetings
Would you like to have better, more engaged meetings? Cisco announced innovations to do just that—using only your voice. Cisco is introducing new AI-powered voice intelligence …
Cequence CQ botDefense now available on AWS Marketplace as a SaaS
Cequence Security announced that its Application Security Platform (ASP) with CQ botDefense is now available as a Software-as-a-Service (SaaS) offering hosted on Amazon Web …
ADVA’s FSP 3000 and FSP 150 platforms to play pivotal role in the OPENQKD project
ADVA announced that its FSP 3000 and FSP 150 platforms will play a pivotal role in the OPENQKD project. Leveraging its ConnectGuard technology, ADVA will provide optical and …
Björn Lidefelt joins HID Global as CEO
HID Global, a worldwide leader in trusted identity solutions, announces Björn Lidefelt has been named President and CEO. Björn joins the company after serving as Chief …
Trustmark appoints Britt Lindley as its new CISO
Trustmark Mutual Holding Company, a national employee benefits provider, has selected Britt Lindley as its new Chief Information Security Officer (CISO). Bradley Bodell, Chief …
Data breach: Why it’s time to adopt a risk-based approach to cybersecurity
The recent high-profile ransomware attack on foreign currency exchange specialist Travelex highlights the devastating results of a targeted cyber-attack. In the weeks …
How to detect and prevent issues with vulnerable LoRaWAN networks
IOActive researchers found that the LoRaWAN protocol – which is used across the globe to transmit data to and from IoT devices in smart cities, Industrial IoT, smart homes, …
Security risks for e-scooters and riders exposed
Micromobility vehicles, such as e-scooters, zip in and out of traffic. For this reason, micromobility is seen as an alleviating trend to help tackle traffic congestion. …
52% of companies use cloud services that have experienced a breach
Seventy-nine percent of companies store sensitive data in the public cloud, according to a McAfee survey. Anonymized cloud event data showing percentage of files in the cloud …
Benefits of blockchain pilot programs for risk management planning
Through 2022, 80% of supply chain blockchain initiatives will remain at a proof-of-concept (POC) or pilot stage, according to Gartner. One of the main reasons for this …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month