Category: Vendors
How Secure Is Your Remote Work Infrastructure?
Most organizations couldn’t even conceive a completely remote workforce, but earlier this year the world experienced an unpredictable circumstance that forced professionals to take on a new form of “business […]You Better Get Going with Go
Well, this is basically my story too. I left Node.js as well, and now I use the Go Language (Golang, Go) as my backend technology of choice. Although Node.js will […]AirID2 – the world’s first smartcard reader with Bluetooth 5 support
AirID is future proof – Bluetooth 5 will enable new possibilities. Düsseldorf, August, 10th, 2020 – certgate, one of the leading German IT security providers, announces the world’s first […]Phish Fryday – Phishing Defense Expertise
SHARES ShareTweet Identifying a phishing email is more than a yes/no, good/bad equation. If it’s bad, you need to know how bad it is. If my user clicked it, what […]The New Normal for Cloud Architecture
The vast majority of customers I talk to are accelerating their digital transformation efforts. Beyond relying more on cloud applications, this means bridging traditional, on premises infrastructures using cloud access […]How Secure is your School for Virtual Learning this Fall? | BeyondTrust
How Secure is your School for Virtual Learning this Fall? | BeyondTrust August 17, 2020 Open You May Also Be Interested In: Our website uses cookies to provide a better […]August 2020 Patch Tuesday – 120 Vulnerabilities, 17 Critical, Media Foundation, Windows Codecs, Workstation, Adobe
This month’s Microsoft Patch Tuesday addresses 120 vulnerabilities with 17 of them labeled as Critical. The 17 Critical vulnerabilities cover Media Foundation, .NET Framework, Browsers, Scripting Engines, Office, Outlook, Windows […]SteelConnect EX SD-WAN Enterprise Data Center Integration
We continue our learning journey on SteelConnect EX, Riverbed’s Enterprise SD-WAN offering. This time, we are going to address one of the hottest and most complex topics when leading a […]Evaluating Threat Intelligence Solutions? Download the New Gartner Market Guide
Evaluating Threat Intelligence Solutions? Download the New Gartner Market Guide POSTED BY LIZ BUSH The surge in the number of remote workers, connected devices, email traffic and new technologies in […]An Anatomy of a Public Cloud Compromise
In many ways, the public cloud is more secure than a traditional data center. And yet, assets on the public cloud are compromised all the same. To learn why, let’s […]Load More