Modern Listing Example
Deal activity remained strong in security technologies space in 2018
Despite the fluctuating trend in venture capital (VC) funding and mergers and acquisitions (M&A) in…
New Study Reveals Cybercrime May Be Widely Underreported— Even When Laws Mandate Disclosure
ISACA’s State of Cybersecurity Report Also Finds Only 1 in 3 Organisations Highly Confident in…
“Managing Cyber Risk” and A Welcome to Cohort 8 to the Australian Landing Pad in Singapore
Cyber Risk Meetup, sponsored by Privasec, joined forces with the Australian Trade and Investment Commission…
ISACA Outlines New Pathways and Training Resources for Cybersecurity Careers
According to new research, nearly 30 per cent of those hiring for a cybersecurity position…
Proofpoint Report Reveals Emotet Drove 61% of Malicious Payloads in Q1 2019
Proofpoint has released its Q1 2019 Threat Report, highlighting the threats and trends across Proofpoint’s global…
New enterprise and security tools strengthen GitHub
GitHub has launched GitHub Sponsors, a new donation-based initiative that will change how global communities…
Managed Service Providers focused on becoming strategic advisors in 2019
Datto annual global survey uncovers increase in recurring services Datto has announced the release of its…
Draft White Paper on Combinatorial Methods for Explainability in Artificial Intelligence and Machine Learning
A draft white paper is now available for comment, An Application of Combinatorial Methods for Explainability…