Please turn on your JavaScript for this page to function normally.
remote work
Developing a plan for remote work security? Here are 6 key considerations

With so many organizations switching to a work-from-home model, many are finding security to be increasingly more difficult to administer and maintain. There is an influx of …

remote workforce protection
How do I select a remote workforce protection solution for my business?

Recent research shows almost three quarters of large businesses believe remote working policies introduced to help stop the spread of COVID-19 are making their companies more …

vault
Cybersecurity after COVID-19: Securing orgs against the new threat landscape

Picture this: An email comes through, offering new COVID-19 workplace safety protocols, and an employee, worn down by the events of the day or feeling anxious about their …

Lenovo Data Center Group delivers updated HCI solutions and Lenovo Cloud Services

Lenovo Data Center Group (DCG) announces a range of new and updated hyperconverged infrastructure (HCI) solutions and Lenovo Cloud Services to enable customers to keep pace …

VMware 5G Telco Cloud Platform simplifies and accelerates the rollout of 5G networks

VMware announced its 5G Telco Cloud Platform, a consistent cloud first solution powered by a field proven, carrier-grade, and high-performance cloud native infrastructure with …

VMware brings Kubernetes to its VMware Fusion and VMware Workstation solutions

VMware unveiled the newest versions of its VMware Fusion and VMware Workstation desktop hypervisor solutions. VMware’s updates support the changing needs of modern developers …

VMware’s updated portfolio helps provision, optimize and govern hybrid and multi-cloud environments

VMware announced innovations across its portfolio of VMware vRealize Cloud Management on-premises and software as a service (SaaS) offerings. The new and enhanced product …

Intel and VMware extend virtualization to RAN through broadened collaboration for 5G

Intel and VMware are collaborating on an integrated software platform for virtualized Radio Access Networks (RAN) to accelerate the rollout of both existing LTE and future 5G …

endpoint protection
How do I select an endpoint protection solution for my business?

Endpoint protection has evolved to safeguard from complex malware and evolving zero-day threats. To select an appropriate endpoint protection solution for your business, you …

Boothole
Bug in widely used bootloader opens Windows, Linux devices to persistent compromise

A vulnerability (CVE-2020-10713) in the widely used GRUB2 bootloader opens most Linux and Windows systems in use today to persistent compromise, Eclypsium researchers have …

bomb
New threat environment elements and global attack trends

There has been an increase in both cyberattack volume and breaches during the past 12 months in the U.S. This has prompted increased investment in cyber defense, with U.S. …

VMware Cloud on AWS drives app modernization, business continuity and better cloud economics

VMware announced new capabilities designed to further improve the economic value of VMware Cloud on AWS while meeting an evolving set of requirements for application …

Don't miss

Cybersecurity news