Anomali and Canon IT join forces to combat zero-day threats
Anomali and Canon IT Solutions have announced the availability of the Canon IT Solutions “Threat Intelligence Platform,” a security operations service that operationalizes …
Mitigating third-party risks with effective cyber risk management
Third-party engagement has steadily become an essential part of business operations for many organizations, enlisted for all kinds of products and services across nearly all …
Canon Medical unveils Gateway Platinum, a multi-level cybersecurity solution
With more than 470,000 patient records exposed or stolen in January of 2018 alone, cyberattacks, viruses and other malicious threats are a growing challenge for healthcare …
Digital transformation helps companies work smarter yet makes them vulnerable to breaches
While digital transformation helps companies work smarter, there is a risk that the ongoing digitization may unlock a host of security vulnerabilities that can cost companies …
Check your printers for leftover GDPR-regulated PII
Many companies are embracing the GDPR as an opportunity to improve privacy, security, and data management, by cutting down on the amount of personal data they keep, ditching …
Securing the digital future with Vera and Canon Solutions America
In this podcast recorded at RSA Conference 2018, Ajay Arora, founder of Vera Security, and Peter Kowalczuk, President at Canon Solutions America, talk about their recent …
Canon selects Vera to secure the future of digital imaging and printing
Canon has selected Vera to secure and protect Canon’s fleet of digital imaging and printing products and services. This partnership will help enterprises protect their …
Featured news
Resources
Don't miss
- Okta users under attack: Modern phishing kits are turbocharging vishing attacks
- One-time SMS links that never expire can expose personal data for years
- More employees get AI tools, fewer rely on them at work
- Energy sector orgs targeted with AiTM phishing campaign
- Exposed training apps are showing up in active cloud attacks