Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Rise of BYOD Once Again

By Nicole Allen, Marketing Executive, SaltDNA. The sudden increase in remote working has ensured that ‘bring your own device’ (BYOD) is once again a hot topic, as the workforce relies on a number…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , | Comments Off on Rise of BYOD Once Again

4 Matchmaking Tips to Find your Perfect SOC 2 Fit

Finding the right Systems and Organizations Controls (SOC 2) auditor for your organization By Patrick Murray, chief product officer, Tugboat Logic Given the heightened scrutiny and due diligence organizations place…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , | Comments Off on 4 Matchmaking Tips to Find your Perfect SOC 2 Fit

Hackers disrupted live broadcasts at Channel Nine. Is it a Russian retaliation?

A cyber attack has disrupted the Australian Channel Nine’s live broadcasts, the company was unable to transmit its Sunday morning news program. A cyber attack has hit the Australian Channel Nine’s live…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Hackers disrupted live broadcasts at Channel Nine. Is it a Russian retaliation?

Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

The Best Network Protection: Go Deep or Go Broad?

By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on The Best Network Protection: Go Deep or Go Broad?

SOCs to Turn to Security Automation to Cope with Growing Threats

Increasingly complex threats, staffing shortages, and rising costs are driving investments in security automation By Chris Triolo, Vice President of Customer Success, FireEye The cybersecurity landscape is becoming ever more…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , , , , | Comments Off on SOCs to Turn to Security Automation to Cope with Growing Threats

Innovation, Automation and Securing A “Work from Anywhere” Environment In The Middle East

By Mazen A. Dohaji, Vice President, India, Middle East, Turkey & Africa (iMETA), LogRhythm. Throughout 2020, enterprises and public sector organizations across the Middle East have been managing disruption and…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on Innovation, Automation and Securing A “Work from Anywhere” Environment In The Middle East

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X