Category: Vendors
Keeping up the fight on cancer during pandemic
In just a few months, COVID-19 changed the world. Millions have been infected and hundreds of thousands have died at the time of writing. This health emergency has strained healthcare […]Combat Data Breaches, Weak Passwords, and Phishing Attacks with Multi-Factor Authentication
Forrester Research has estimated that 80 percent of security breaches involve weak, default, stolen, or otherwise compromised privileged credentials. Since organizations lack the ability to verify whether the user accessing […]The FireEye Approach to Effective Cloud Security
Reports indicate that roughly 83% of workloads are in the cloud as of this year. That’s a lot of new real estate for attackers, and now is the perfect time […]INSPIRE 20 – Summer Break
With five outstanding INSPIRE 20 podcasts under our belt, our team is taking a few weeks break to relax, refresh, and build up some more exciting and informative podcasts for […]Top Six VMworld 2020 Sessions and Activities for a Threat Hunter
I’m excited to be a part of VMworld 2020 as a speaker and as a member of VMware Carbon Black. This year at VMworld 2020, hundreds of security experts will take the virtual […]How Secure Is Your Remote Work Infrastructure?
Most organizations couldn’t even conceive a completely remote workforce, but earlier this year the world experienced an unpredictable circumstance that forced professionals to take on a new form of “business […]You Better Get Going with Go
Well, this is basically my story too. I left Node.js as well, and now I use the Go Language (Golang, Go) as my backend technology of choice. Although Node.js will […]AirID2 – the world’s first smartcard reader with Bluetooth 5 support
AirID is future proof – Bluetooth 5 will enable new possibilities. Düsseldorf, August, 10th, 2020 – certgate, one of the leading German IT security providers, announces the world’s first […]Phish Fryday – Phishing Defense Expertise
SHARES ShareTweet Identifying a phishing email is more than a yes/no, good/bad equation. If it’s bad, you need to know how bad it is. If my user clicked it, what […]The New Normal for Cloud Architecture
The vast majority of customers I talk to are accelerating their digital transformation efforts. Beyond relying more on cloud applications, this means bridging traditional, on premises infrastructures using cloud access […]Load More