Category: News
RISK 2020: Preliminary Agenda now Live!
Dear Sir/Madam, we have just published the preliminary agenda for the 15th annual RISK conference, the largest IT security conference in the Adriatic region, that will be taking place on […]Announcing RISK conference 2020!
Dear sirs, we are very proud to announce our next RISK 2020 conference, the premier IT security and networking event in the Adriatic region. It will take place on the 18th and […]7 Firewall Best Practices for Securing Your Network
7 Firewall Best Practices for Securing Your Network A network firewall is your most crucial security tool that must be as robust as it can get. Network firewall configuration can be a challenging task for administrators as they have to strikeSign-up to Netwrix Webinars on Data Security Toolkits
SIEMple Tests to Assess Any SIEM Solution January 23 @ 2 pm GMT / 3 pm CET Whether you’re already using a SIEM solution or still evaluating your options, check […]People, Data and AI
Each year, through its well recognized industry market research, Gartner lays out the strategic technology trends for the upcoming year. Recently, Gartner published the top 10 strategic technology trends for 2020. According to Gartner, TheThe Invisible Risk – Why Supply Chain Is a Top Security Priority and What to Do About It
The security community received a very powerful and earth-shattering awakening when Heartbleed, a critical security bug in the OpenSSL cryptographic library, was disclosed in 2014. OpenSSL was and continues to be a critical component used toCyber deception – five years in
Five years in, cyber deception has changed everything in how we run security operations. There is nothing more frustrating than going to work every morning knowing that we are going to lose. If the attackers want it enough, there is little weBundle Up and Build an End-to-End Phishing Defense
By David Mount, Product Marketing Back in 2008, CofenseTM (then PhishMe®) pioneered the concept of phishing simulation as a tool to reduce organizational risk to phishing threats. Since then, the phishing threat landscape has evolved at a rapidZero Trust Model: 4 Common Myths Exposed
Whether your IT infrastructure is on premises, in the cloud or hybrid, it is at risk of data breaches. By compromising a single user’s credentials, attackers can breach your organization’s network security and gain access to all the sensitiveComparing Public (Permissionless) and Private (Permissioned) Blockchains – What is Best for Banking and Payment Services
In this article, we will explain how blockchains work, what are the differences between public and permissioned blockchain networks, and how banks currently position themselves in regards to these networks.Load More