Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple…

German Parliament Bundestag targeted again by Russia-linked hackers

Several members of the German Parliament (Bundestag) and other members of the state parliament were hit…

SOCs to Turn to Security Automation to Cope with Growing Threats

Increasingly complex threats, staffing shortages, and rising costs are driving investments in security automation By Chris…

REvil ransomware gang hacked Acer and is demanding a $50 million ransom

Taiwanese multinational hardware and electronics corporation Acer was victim of a REvil ransomware attack, the gang demanded a…

Are Encrypted Communication Apps used for Crime Operations?

By Nicole Allen, Marketing Executive,  SaltDNA. Police have successfully infiltrated some of the biggest criminal markets…

Redefining Digital Risk: 3 Considerations for Your Cybersecurity Strategy in 2021

As we enter a new era of interconnected cybersecurity threats, companies and organizations would be wise…

How Next-Gen Identity Governance and Administration (IGA) Fits in with Your Hybrid IT Strategy

By Thomas Müller-Martin, Global Partner Technical Lead, Omada More and more organizations are using a hybrid…