<
>

Posts in Mobile & Wireless

Check Point Software Introduces Malicious File Protection for Mobile Devices

Check Point® Software Technologies Ltd., a leading provider of cyber security solutions globally, announces the availability of the most complete cyber protection against mobile-related threats...

Ransomware Threat Rises: Verizon 2022 Data Breach Investigations Report

The Verizon Business 2022 Data Breach Investigations Report (2022 DBIR) examines an unprecedented year in cybersecurity history, and sheds light on some of the leading issues affecting the...

6 Ways to Secure the Network Edge in Today’s Work from Anywhere Environment

As we gravitate more towards the hybrid workforce, it’s evident that there is no turning back. According to Mckinsey & Company, 52% of employees say a hybrid working model is the preferred...

ExtraHop Report: 83% of APAC Organisations Suffered a Ransomware Attack in the Past Five Years; 68% Tried to Keep it Quiet

ExtraHop hasreleased findings from a new survey that shows 83% of organisations in Asia Pacific were breached by ransomware at least once in the past five years, but only 32% publicly disclosed that...

Synopsys Acquiring WhiteHat Security to Expand Its Application Security Software-as-a-Service Capabilities

Synopsys, Inc. announced that it has signed a definitive agreement to acquire WhiteHat Security, a leading provider of application security Software-as-a-Service (SaaS). The addition of WhiteHat...

Securing the $54bn Streaming Industry: Why a 360-Degree Approach Is Needed to Fight Digital Pirates

To be attributed to: Rishi Varma, Director of Product Management, APJ, Akamai   The streaming industry has seen massive growth over the past year as viewers turned online for their...

Checkmarx SCA Now Available as Native Integration within JetBrains IntelliJ IDEA Ultimate

Checkmarx and JetBrains announced their strategic partnership today and the general availability of a native integration.    Checkmarx’ Software Composition Analysis (SCA)...

A New Age of Cyber Warfare Motivates the Next Generation of Cybersecurity Training

The rush is underway to digitally transform our society which leaves companies, educational institutes, hospitals, governments and individuals, vulnerable to hackers. According to the Center For...

Attackers Infiltrate a Single Server for Five Months, Using it to Browse Online for Tools to Help Them With Further Parts of the Attack, Sophos Finds

Sophos released findings on how attackers breached and spent five months inside a regional government server in the U.S., using it to browse online for a mix of hacker and IT administration tools...

Industry Research Reveals Ransomware Readiness is Essential to Mitigation, Yet Significant Gaps Exist Within Most Organisations

A Hewlett Packard Enterprise company announced the findings of a major new ransomware study, revealing that gaps in readiness are seriously impacting the ability of many organizations to manage...

Pages

Subscribe to RSS - Mobile & Wireless