Virtual Security and why it matters so much to SMEs
By Jack Viljoen, Head of Marketing, Prodinity In recent years, there has been an exponential rise in the number of […]
By Jack Viljoen, Head of Marketing, Prodinity In recent years, there has been an exponential rise in the number of […]
Remcos Trojan (Remote Control and Surveillance) is frequently delivered by threat actors leveraging phishing attack vectors. The malware currently reemerges
Leaks of API keys and other secrets. The industry has been abuzz with news about attacks – and the ongoing
Why biometric security is crucial in a post-quantum world By Nils Gerhardt, Chief Technology Officer for Utimaco Many are saying
Abbott Ekta Sirwani https://www.linkedin.com/in/ekta-sirwani/ Absolute Christy Wyatt https://www.linkedin.com/in/christywyatt/ Alert Logic Sydna Kelley https://www.linkedin.com/in/sydnakelley/ Alta Associates Joyce Brocaglia https://www.linkedin.com/in/joycebrocaglia/ AppEsteem Corporation
These CISOs competed against thousands of candidates for this prestigious award. Judges look at these candidates, searching for the
10dot https://10dot.com/ Acronis https://www.acronis.com/ Alertot https://www.alertot.com/ Aqua https://www.aquasec.com/ Argus Security https://www.argussecurity.it/ Augmenta Cyber Security https://augcyba.com/ Auth0 https://auth0.com/ Authomize https://www.authomize.com/
A CISO’s job has never been more challenging. Engineering teams move fast, especially as organizations are accelerating their digital transformation
Since the outbreak of the global cyber war, state bodies of Ukraine and its allies have become targets of diverse
By Milica D. Djekic, Independent Researcher from Subotica, the Republic of Serbia. Abstract: Some criminology studies suggest crime can be