Anomali and Canon IT join forces to combat zero-day threats
Anomali and Canon IT Solutions have announced the availability of the Canon IT Solutions “Threat Intelligence Platform,” a security operations service that operationalizes …
Mitigating third-party risks with effective cyber risk management
Third-party engagement has steadily become an essential part of business operations for many organizations, enlisted for all kinds of products and services across nearly all …
Canon Medical unveils Gateway Platinum, a multi-level cybersecurity solution
With more than 470,000 patient records exposed or stolen in January of 2018 alone, cyberattacks, viruses and other malicious threats are a growing challenge for healthcare …
Digital transformation helps companies work smarter yet makes them vulnerable to breaches
While digital transformation helps companies work smarter, there is a risk that the ongoing digitization may unlock a host of security vulnerabilities that can cost companies …
Check your printers for leftover GDPR-regulated PII
Many companies are embracing the GDPR as an opportunity to improve privacy, security, and data management, by cutting down on the amount of personal data they keep, ditching …
Securing the digital future with Vera and Canon Solutions America
In this podcast recorded at RSA Conference 2018, Ajay Arora, founder of Vera Security, and Peter Kowalczuk, President at Canon Solutions America, talk about their recent …
Canon selects Vera to secure the future of digital imaging and printing
Canon has selected Vera to secure and protect Canon’s fleet of digital imaging and printing products and services. This partnership will help enterprises protect their …
Featured news
Sponsored
Don't miss
- Industrial companies in Europe targeted with GuLoader
- North Korean hackers employ new tactics to compromise crypto-related businesses
- Critical vulnerability in Cisco industrial wireless access points fixed (CVE-2024-20418)
- How AI will shape the next generation of cyber threats
- AWS security essentials for managing compliance, data protection, and threat detection