Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Expert publicly released Chromium-based browsers exploit demonstrated at Pwn2Own 2021

An Indian security researcher has published a proof-of-concept (PoC) exploit code for a vulnerability impacting Google Chrome and other Chromium-based browsers. The Indian security researcher Rajvardhan Agarwal has publicly released…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Comments Off on Expert publicly released Chromium-based browsers exploit demonstrated at Pwn2Own 2021

Rise of BYOD Once Again

By Nicole Allen, Marketing Executive, SaltDNA. The sudden increase in remote working has ensured that ‘bring your own device’ (BYOD) is once again a hot topic, as the workforce relies on a number…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , | Comments Off on Rise of BYOD Once Again

Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

The Best Network Protection: Go Deep or Go Broad?

By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on The Best Network Protection: Go Deep or Go Broad?

SOCs to Turn to Security Automation to Cope with Growing Threats

Increasingly complex threats, staffing shortages, and rising costs are driving investments in security automation By Chris Triolo, Vice President of Customer Success, FireEye The cybersecurity landscape is becoming ever more…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , , , , | Comments Off on SOCs to Turn to Security Automation to Cope with Growing Threats

Why Security Shouldn’t Only Fall on Employees

By Amit Bareket, Co-founder and CEO, Perimeter 81 As each day passes by, the news of a new data breach grabs the latest headlines. While there could be many reasons…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on Why Security Shouldn’t Only Fall on Employees

Are Encrypted Communication Apps used for Crime Operations?

By Nicole Allen, Marketing Executive,  SaltDNA. Police have successfully infiltrated some of the biggest criminal markets on the dark web – but it’s pushing criminals into using encrypted apps which…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Comments Off on Are Encrypted Communication Apps used for Crime Operations?

Redefining Digital Risk: 3 Considerations for Your Cybersecurity Strategy in 2021

As we enter a new era of interconnected cybersecurity threats, companies and organizations would be wise to overhaul their entire view of the online landscape in order to be fully…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on Redefining Digital Risk: 3 Considerations for Your Cybersecurity Strategy in 2021

How Next-Gen Identity Governance and Administration (IGA) Fits in with Your Hybrid IT Strategy

By Thomas Müller-Martin, Global Partner Technical Lead, Omada More and more organizations are using a hybrid IT environment that combines both on-premises and cloud-based applications. The rise of remote work,…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , | Comments Off on How Next-Gen Identity Governance and Administration (IGA) Fits in with Your Hybrid IT Strategy

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X