Cyber Resilience Cyber Resilience | Data Breach | Editor's Desk | IT solutions | May 12, 2022 Zero Trust with Zero Exceptions Palo Alto Networks today urged the industry to move to Zero Trust Network Access 2.0 (ZTNA 2.0) — the foundation for a new era… Read More
IT solutions IT solutions | Miscellaneous | Security Products | TechTime | May 12, 2022 Ivanti on the Lookout for Zero Trust Access Ivanti and Lookout have announced they have joined forces to help organisations accelerate cloud adoption and mature their Zero Trust… Read More
Featured Featured | IT solutions | TechTime | vulnerabilities | May 12, 2022 Red Hat’s Enterprise Linux 9 Red Hat has announced it has introduced Red Hat Enterprise Linux 9. Red Hat Enterprise Linux 9 incorporates key enhancements… Read More
Cyber Resilience Cyber Resilience | Featured | IT solutions | TechTime | May 6, 2022 Apple, Google and Microsoft Sign Up for Security In a joint effort to make the web more secure and usable for all, Apple, Google and Microsoft have announced… Read More
Cyber Resilience Cyber Resilience | Editor's Desk | Events | Featured | IT solutions | May 6, 2022 NATO´s Locked Shields Exercise From April 19 to April 22, 2022, Locked Shields, the biggest international live-fire cyber defence exercise, took place in Tallinn,… Read More
Editor's Desk Editor's Desk | Featured | IT solutions | Security Products | TechTime | May 5, 2022 Securing Developer Accounts with 2FA By Mike Hanley, Chief Security Officer, GitHub. The software supply chain starts with the developer. Developer accounts are frequent targets… Read More
Featured Featured | IT solutions | Movers & Shakers | Security Products | TechTime | May 4, 2022 Cosafe’s Explicate Expansion Cosafe has announced it is expanding to the Netherlands, Belgium and Luxembourg. Cosafe has entered into an agency agreement with… Read More
Featured Featured | IT solutions | Movers & Shakers | Security Products | May 3, 2022 Assac’s Journey into Africa Assac Networks has announced it has been awarded contracts for the supply and installation of its unique ShieldiT system, for… Read More
Cyber Resilience Cyber Resilience | Data Breach | Featured | IT solutions | May 2, 2022 Update: Emotet botnet and Bumblebee Malware Cybersecurity researchers at Proofpoint have this week published new research on Emotet – one of the most prolific cybercriminal threats before its… Read More
Artificial Intelligence Artificial Intelligence | Featured | IT solutions | TechTime | April 28, 2022 CrowdStrike’s New Adversary-Focused CNAPP CrowdStrike says it has introduced new Cloud Native Application Protection Platform (CNAPP) capabilities to accelerate threat hunting for cloud environments and… Read More