Category: News
OpenText World 2020—Are You Ready for the Great Rethink?
The world is not changing. It has changed. These changes are deep. Structural. Lasting. We must use this opportunity to rethink on a massive scale. Rethink the nature of humanity […]Threats Targeting VoIP Networks as Usage Surges During Pandemic
Internet service providers are seeing a spike in Voice over Internet Protocol (VoIP) usage driven by the increased adoption of working from home during the COVID-19 pandemic. This has been […]INSPIRE 20 – mark my words! The importance of diverse tech innovation
UKBlackTech All I can say about this week’s episode is WOW, Mark Martin, what an episode! Mark, a computer science teacher and founder of UKBlackTech, joins us this week to […]Crossing the Narrow Sea
Tom Kellermann, Head of Cybersecurity Strategy at VMware and Member of the Cyber Investigations Advisory Board of the United States Secret Service. “The Greatest trick the devil ever pulled was […]The Deepfakes Lab: Detecting & Defending Against Deepfakes with Advanced AI
Deepfakes began to gain attention when a fake pornography video featuring a “Wonder Woman” actress was released on Reddit in late 2017 by a user with the pseudonym “deepfakes.” Several […]The Inception of Mandiant Advantage
Our customers expressed a desire for faster access to our intelligence to focus on threat activity that matters to them, so we launched Mandiant Advantage. Mandiant Advantage is a new SaaS […]Cybersecurity Awareness Month Week 3: Day in the Life, AppSec Educator
In the security industry, enough can’t be said about the need for spreading awareness. It’s the first, and most critical, step in spurring action and turning the tides from being […]Mandatory Internal Company Communications: The Best Time to Phish
Companies are awash with numerous corporate communications: open enrollment notifications, new policies and so forth. With this crush of mandatory emails being sent out, threat actors are given the right […]Understanding Authentication vs. Authorization | BeyondTrust
Understanding Authentication vs. Authorization | BeyondTrust October 19, 2020 Open You May Also Be Interested In: Our website uses cookies to provide a better user experience, personalize content, and serve […]Qualys Policy Compliance Plugin for Jenkins Now Available
Various factors may introduce vulnerabilities in a product during its lifecycle, resulting in a drift from the required compliance status. Hence, it is of utmost importance that security is baked […]Load More