Category: Vendors
Mirai Rebirth Highlights Importance of Defending IoT
Enterprises of all sizes face a massive challenge when it comes to IoT security. With so many business operations reliant on technology, there can be vulnerabilities hiding in a multitude of places. Security teams, especially those who work inFrom Mobile and ISP to Endpoint Engineering: Undergoing a Role Transition in the Security Industry
The technology around us is constantly changing, and cybersecurity practices are evolving to match these new innovations. As the cybersecurity landscape shifts to meet the needs presented by new technology, opportunities arise for cybersecurityRISK 2019 Serbia Preliminary Agenda Published!
We have just published the preliminary agenda for conference RISK 2019 Serbia, which will take place on May 29th 2019 at Radisson Collection Hotel, Old Mill Belgrade, Serbia. Attend presentations […]Global Credential Management Solutions Market To Reach $1.8 Billion by 2025
By Joakim Thorén, CEO The Global Credential Management Solutions Market is growing quickly and projected to reach $1.8 Billion by 2025, signaling the times in which we live where data breaches, state-sponsored hackers and election tampering areThree Critical Tips for Using Network SFPs
Small Form-factor Pluggable transceivers (SFP) are very convenient and flexible devices for connecting network equipment. They plug into standard ports designed into network devices and related appliances. There are special benefits associatedWhat to Consider When Migrating and Managing Microsoft Office 365
The future is SaaS Migrating to Microsoft Office 365 often feels like a forgone conclusion since the on-premises model has been making way for SaaS for some time now. In fact, 95% of IT decision makers expect to rely on the SaaS model forDon’t Underestimate Credential Theft Malware
As 2018 came to a close, I stopped to reflect about the various threats we saw this year – particularly in Europe. While Europe continued to struggle with targeted attacks from organized cyber criminal groups and cyber espionage groups, thereBreaking the Bank: Weakness in Financial AI Applications
Currently, threat actors possess limited access to the technology required to conduct disruptive operations against financial artificial intelligence (AI) systems and the risk of this targeting type remains low. However, there is a high risk ofBeyond buzzwords – what cognitive science means to cybersecurity
Artificial Intelligence, Neural Networks, Cognitive Computing, and Machine Learning are all buzzwords applied to cybersecurity. But what do they actually mean? Are marketing departments simply re-using cognitive science terms to createSix months in – GDPR Costs Exceeded Expectations
By Joakim Thorén, CEO Just about six months after the implementation of the EU's General Data Protection Regulation, we polled companies both in Europe and beyond to learn how the GDPR is impacting them. Among the most important findings:Load More