<
>

FireEye Endpoint Security Introduces Innovation Architecture for Rapid Deployment of Advanced Capabilities

FireEye, Inc., the intelligence-led security company, introduced a new Innovation Architecture behind FireEye® Endpoint Security, including the availability of several...

4-in-10 Online Users in APAC Faced Private Data Leak

A recent survey conducted by global cybersecurity company Kaspersky has revealed that 40% of consumers from the Asia Pacific (APAC) have faced incidents where their...

Blackberry Spark Suites Offers Intelligent Cybersecurity and Endpoint Management Options

BlackBerry Limited announced availability of BlackBerry Spark® Suites, offering enterprises a range of tailo

ExtraHop Introduces Reveal(x) 360; Provides Unified Threat Visibility Across Multicloud and Hybrid Workloads

ExtraHop, the leader in cloud-native network detection and response, announced the general availability of Reveal(x) 360, the first SaaS-based network detection and...

WSJ Intelligence and Forcepoint Survey Reveals CEOs Fear is Becoming the Next Big Breach

Global cybersecurity leader Forcepoint, in partnership with WSJ Intelligence, revealed The C-Suite Report: The Current and Future State of Cybersecurity featuring new...

One Identity Announced New Sudo Features Enhancing Security Measures

One Identity, a proven leader in identity-centred security and the corporate sponsor of the open source Sudo project, announced that a new version of Sudo that enables...

Verizon Business 2020 Data Breach Investigations Report Reveals More Breaches Identified Compare to Last Year

The Verizon Business 2020 Data Breach Investigations Report (2020 DBIR) shows that financial gain remains the key driver for cybercrime with nearly nine in 10 (86...

NTT Ltd.’s Global Threat Intelligence Report Reveals Cyber Criminals Innovate Faster and Automate Attacks

NTT Ltd., a world-leading global technology services provider, launched its 2020 Global Threat Intelligence Report (GTIR), which reveals that despite efforts by...

Corporate Security Worries IT Pros More than Home Security

Data security is creating fear and trust issues for IT professionals, according to the third-annual Oracle and KPMG Cloud Threat Report 2020.

Retarus Offers Email Continuity Service Ensuring Employees Remain Productive Despite of Cyberattack

When IT systems are no longer functioning, critical business processes grind to a halt. The costs incurred when operations fail can quickly skyrocket into millions.

Pages