Category: News
What to Expect from the Next Generation of Secure Web Gateways
While secure web gateways (SWGs) have operated on a far more compressed timetable, a similarly drastic evolution has taken place. SWGs are still largely focused on ensuring users are protected […]Clouds Are Secure, Are You Using Them Securely?
Cloud technology isn’t new, but it’s still unfamiliar ground for many organizations. As if migrating to the cloud wasn’t already a massive undertaking, the added responsibility of integrating a comprehensive […]It’s Time to Update Your Drupal Now!
Drupal just recently released two major versions, which piqued our researchers’ interest. Once the team got to work on the two latest versions of Drupal, they quickly found that both […]Group-IB enters the Adriatic region joining forces with Slovenia’s REAL security
Maribor, 24/06/20 – Group-IB, a Singapore-based cybersecurity company Group-IB, has signed a partnership agreement with REAL security. REAL security becomes the first value-added distributor of Group-IB’s solutions in Slovenia. Under […]Group-IB vstopa v Adriatik regijo v sodelovanju s slovenskim REAL security
Maribor, 24/06/20 – Singapurska družba za kibernetsko varnost, Group-IB, je podpisala partnersko pogodbo z distributerjem dodane vrednosti REAL security. V skladu z dogovorom bodo banke, podejtja, zasebna in javna podjetja […]How Can Organizations Best Go About With Disaster Recovery Planning In 2020?
How Can Organizations Best Go About With Disaster Recovery Planning In 2020? A disaster recovery plan is a document that protects an organization from the effects of unforeseen catastrophes. It […]Practice Makes Perfect
The Phishing Defense Center (PDC) has discovered two distinct phishing campaigns found in environments protected by Proofpoint that spoof Twitter by using registered fraudulent domains. By Noah Mizell and Kyle […]Together we are stronger – Partnerships that work
James Phillips · Wednesday, June 17th, 2020 Over the last 12 months, I have been part of the Titus team that has pivoted the organization from a direct-to-customer sales approach […]Takeaways from New Federal IT Leadership Report
The new report, Federal Cybersecurity in a Changing World, garnered feedback from federal IT practitioners on the state of cybersecurity today, challenges they encounter in formulating their ideal agency-wide strategy, […]How Trusted Application Protection Builds on Application Control & Endpoint Privilege Management | BeyondTrust
How Trusted Application Protection Builds on Application Control & Endpoint Privilege Management | BeyondTrust June 18, 2020 Open You May Also Be Interested In: Our website uses cookies to provide […]Load More