Cyber Resilience Cyber Resilience | Featured | IT solutions | TechTime | May 13, 2022 $30M to Fuel Cybersecurity Technologies CyberArk has announced the launch of CyberArk Ventures – a $30 million global investment fund designed to empower the next generation… Read More
Featured Featured | IT solutions | TechTime | vulnerabilities | May 12, 2022 Red Hat’s Enterprise Linux 9 Red Hat has announced it has introduced Red Hat Enterprise Linux 9. Red Hat Enterprise Linux 9 incorporates key enhancements… Read More
Cyber Resilience Cyber Resilience | Data Breach | Featured | Risk Management | vulnerabilities | May 11, 2022 Malware Mayhem: Sharp Increase in Phishing Downloads Netskope has published new research which found that phishing downloads saw a sharp increase of 450% over the past 12… Read More
Cyber Resilience Cyber Resilience | Data Breach | Featured | vulnerabilities | May 11, 2022 Still Vulnerable | A Year on from Colonial Pipeline Cyberattack Following the one-year anniversary of the ransomware attack on energy pipeline operator Colonial Pipeline, which led to widespread fuel shortages… Read More
Cyber Resilience Cyber Resilience | Featured | IT solutions | TechTime | May 6, 2022 Apple, Google and Microsoft Sign Up for Security In a joint effort to make the web more secure and usable for all, Apple, Google and Microsoft have announced… Read More
Awards Awards | Cyber Resilience | Events | Featured | May 6, 2022 ABB’s Globally Recognized Certification ABB has been awarded exida’s IEC 62443-2-4 certificate, the highest acknowledgment of advanced capability to manage the delivery and performance… Read More
Cyber Resilience Cyber Resilience | Editor's Desk | Events | Featured | IT solutions | May 6, 2022 NATO´s Locked Shields Exercise From April 19 to April 22, 2022, Locked Shields, the biggest international live-fire cyber defence exercise, took place in Tallinn,… Read More
Editor's Desk Editor's Desk | Featured | IT solutions | Security Products | TechTime | May 5, 2022 Securing Developer Accounts with 2FA By Mike Hanley, Chief Security Officer, GitHub. The software supply chain starts with the developer. Developer accounts are frequent targets… Read More
Featured Featured | IT solutions | Movers & Shakers | Security Products | TechTime | May 4, 2022 Cosafe’s Explicate Expansion Cosafe has announced it is expanding to the Netherlands, Belgium and Luxembourg. Cosafe has entered into an agency agreement with… Read More
Featured Featured | IT solutions | Movers & Shakers | Security Products | May 3, 2022 Assac’s Journey into Africa Assac Networks has announced it has been awarded contracts for the supply and installation of its unique ShieldiT system, for… Read More