Cohesity Research Reveals that Reliance on Legacy Technology Is Undermining How Organizations Respond to Ransomware
Nearly half of respondents say their company relies on outdated backup and recovery infrastructure — in some cases dating back…
Nearly half of respondents say their company relies on outdated backup and recovery infrastructure — in some cases dating back…
How the skills shortage is threatening cyber security By Jamal Elmellas, COO, Focus-on-Security Finding sufficient talent has been […] The…
Fund managers should not get caught out thinking they are a low-priority target: here’s how to identify risks […] The…
The new open source tools are designed to help defense, identity and access management, and security operations center teams discover…
By Bryan Alsdorf, Director of IT and Head of Information Security, MariaDB Corporation To paraphrase a mantra popularized […] The…
Microsoft has announced a new security product allowing security teams to spot Internet-exposed resources in their organization's environment that attackers…
Microsoft Defender Experts for Hunting, a new managed security service for Microsoft 365 Defender customers, is now generally available. [...]
Identity and access management was front and center at AWS re:inforce this week.
The new GuardDuty Malware Protection and Amazon Detective were among 10 products and services unveiled at AWS re:Inforce in Boston…
New global study from ESG and ISSA reveals nearly half of organizations are consolidating or plan on consolidating the number…