Featured Featured | IT solutions | Security Products | TechTime | August 6, 2024 Rapid7 Launches Unified Threat Exposure, Detection, and Response Platform Rapid7, Inc. has launched its Command Platform, a unified threat exposure, detection, and response platform. The new platform allows customers… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | Risk Management | vulnerabilities | August 1, 2024 Report Highlights Fast Rising Rate of Email Attacks Acronis’ newly released H1 2024 Cyberthreats Report reveals a 293% surge in email attacks compared to the same time last… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | IT solutions | vulnerabilities | August 1, 2024 Vulnerability Scanning Activity Soars During Paris Olympics Imperva has identified a 770,000% increase in vulnerability scanning activity on Olympic-related sites from June to July 2024, indicating a… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | IT solutions | vulnerabilities | August 1, 2024 Apple Addresses Dozens of Vulnerabilities With Latest Updates Apple has released security updates to address vulnerabilities in Safari, iOS, iPadOS, macOS, watchOS, tvOS, and visionOS. The updates address… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | IT solutions | July 31, 2024 Qualys Unveils TruRisk Eliminate Remediation Solution Cloud-based IT, security and compliance solutions provider Qualys has debuted a comprehensive remediation solution called TruRisk Eliminate at Black Hat… Read More Cyber Resilience Cyber Resilience | Featured | IT solutions | Risk Management | July 29, 2024 Robust Cybersecurity Measures Required in Healthcare The growing dependence on technology in healthcare is resulting in a pressing need for increased spending on medical device security,… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | vulnerabilities | July 23, 2024 Data Lake Security an Essential Part of Today’s Data Architecture By Vivek Shitole With nearly half a billion terabytes of data created and a significant portion transacted daily, the need… Read More Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More Previous 1 … 9 10 11 12 13 … 500 Next
Cyber Resilience Cyber Resilience | Data Breach | Featured | Risk Management | vulnerabilities | August 1, 2024 Report Highlights Fast Rising Rate of Email Attacks Acronis’ newly released H1 2024 Cyberthreats Report reveals a 293% surge in email attacks compared to the same time last… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | IT solutions | vulnerabilities | August 1, 2024 Vulnerability Scanning Activity Soars During Paris Olympics Imperva has identified a 770,000% increase in vulnerability scanning activity on Olympic-related sites from June to July 2024, indicating a… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | IT solutions | vulnerabilities | August 1, 2024 Apple Addresses Dozens of Vulnerabilities With Latest Updates Apple has released security updates to address vulnerabilities in Safari, iOS, iPadOS, macOS, watchOS, tvOS, and visionOS. The updates address… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | IT solutions | July 31, 2024 Qualys Unveils TruRisk Eliminate Remediation Solution Cloud-based IT, security and compliance solutions provider Qualys has debuted a comprehensive remediation solution called TruRisk Eliminate at Black Hat… Read More Cyber Resilience Cyber Resilience | Featured | IT solutions | Risk Management | July 29, 2024 Robust Cybersecurity Measures Required in Healthcare The growing dependence on technology in healthcare is resulting in a pressing need for increased spending on medical device security,… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | vulnerabilities | July 23, 2024 Data Lake Security an Essential Part of Today’s Data Architecture By Vivek Shitole With nearly half a billion terabytes of data created and a significant portion transacted daily, the need… Read More Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More Previous 1 … 9 10 11 12 13 … 500 Next
Cyber Resilience Cyber Resilience | Data Breach | Featured | IT solutions | vulnerabilities | August 1, 2024 Vulnerability Scanning Activity Soars During Paris Olympics Imperva has identified a 770,000% increase in vulnerability scanning activity on Olympic-related sites from June to July 2024, indicating a… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | IT solutions | vulnerabilities | August 1, 2024 Apple Addresses Dozens of Vulnerabilities With Latest Updates Apple has released security updates to address vulnerabilities in Safari, iOS, iPadOS, macOS, watchOS, tvOS, and visionOS. The updates address… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | IT solutions | July 31, 2024 Qualys Unveils TruRisk Eliminate Remediation Solution Cloud-based IT, security and compliance solutions provider Qualys has debuted a comprehensive remediation solution called TruRisk Eliminate at Black Hat… Read More Cyber Resilience Cyber Resilience | Featured | IT solutions | Risk Management | July 29, 2024 Robust Cybersecurity Measures Required in Healthcare The growing dependence on technology in healthcare is resulting in a pressing need for increased spending on medical device security,… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | vulnerabilities | July 23, 2024 Data Lake Security an Essential Part of Today’s Data Architecture By Vivek Shitole With nearly half a billion terabytes of data created and a significant portion transacted daily, the need… Read More Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More Previous 1 … 9 10 11 12 13 … 500 Next
Cyber Resilience Cyber Resilience | Data Breach | Featured | IT solutions | vulnerabilities | August 1, 2024 Apple Addresses Dozens of Vulnerabilities With Latest Updates Apple has released security updates to address vulnerabilities in Safari, iOS, iPadOS, macOS, watchOS, tvOS, and visionOS. The updates address… Read More Cyber Resilience Cyber Resilience | Data Breach | Featured | IT solutions | July 31, 2024 Qualys Unveils TruRisk Eliminate Remediation Solution Cloud-based IT, security and compliance solutions provider Qualys has debuted a comprehensive remediation solution called TruRisk Eliminate at Black Hat… Read More Cyber Resilience Cyber Resilience | Featured | IT solutions | Risk Management | July 29, 2024 Robust Cybersecurity Measures Required in Healthcare The growing dependence on technology in healthcare is resulting in a pressing need for increased spending on medical device security,… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | vulnerabilities | July 23, 2024 Data Lake Security an Essential Part of Today’s Data Architecture By Vivek Shitole With nearly half a billion terabytes of data created and a significant portion transacted daily, the need… Read More Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More Previous 1 … 9 10 11 12 13 … 500 Next
Cyber Resilience Cyber Resilience | Data Breach | Featured | IT solutions | July 31, 2024 Qualys Unveils TruRisk Eliminate Remediation Solution Cloud-based IT, security and compliance solutions provider Qualys has debuted a comprehensive remediation solution called TruRisk Eliminate at Black Hat… Read More Cyber Resilience Cyber Resilience | Featured | IT solutions | Risk Management | July 29, 2024 Robust Cybersecurity Measures Required in Healthcare The growing dependence on technology in healthcare is resulting in a pressing need for increased spending on medical device security,… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | vulnerabilities | July 23, 2024 Data Lake Security an Essential Part of Today’s Data Architecture By Vivek Shitole With nearly half a billion terabytes of data created and a significant portion transacted daily, the need… Read More Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More Previous 1 … 9 10 11 12 13 … 500 Next
Cyber Resilience Cyber Resilience | Featured | IT solutions | Risk Management | July 29, 2024 Robust Cybersecurity Measures Required in Healthcare The growing dependence on technology in healthcare is resulting in a pressing need for increased spending on medical device security,… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | vulnerabilities | July 23, 2024 Data Lake Security an Essential Part of Today’s Data Architecture By Vivek Shitole With nearly half a billion terabytes of data created and a significant portion transacted daily, the need… Read More Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More Previous 1 … 9 10 11 12 13 … 500 Next
Cyber Resilience Cyber Resilience | Editor's Desk | Featured | vulnerabilities | July 23, 2024 Data Lake Security an Essential Part of Today’s Data Architecture By Vivek Shitole With nearly half a billion terabytes of data created and a significant portion transacted daily, the need… Read More Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More Previous 1 … 9 10 11 12 13 … 500 Next
Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More Previous 1 … 9 10 11 12 13 … 500 Next