Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints

By Boyd White, Director, Technical Account Management, Tanium Endpoint management is critical as agencies try to…

4 Matchmaking Tips to Find your Perfect SOC 2 Fit

Finding the right Systems and Organizations Controls (SOC 2) auditor for your organization By Patrick Murray,…

Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce

By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple…

SOCs to Turn to Security Automation to Cope with Growing Threats

Increasingly complex threats, staffing shortages, and rising costs are driving investments in security automation By Chris…

CISA is warning of vulnerabilities in GE Power Management Devices

U.S. Cybersecurity & Infrastructure Security Agency (CISA) warns of flaws in GE Power Management Devices that…

Are Encrypted Communication Apps used for Crime Operations?

By Nicole Allen, Marketing Executive,  SaltDNA. Police have successfully infiltrated some of the biggest criminal markets…

Moving to Active Defense: What It Means, How It Works and What You Can Do Now

By Ofer Israeli, CEO and founder, Illusive Networks Despite the myriad cybersecurity solutions out there, breaches,…

UnityMiner targets unpatched QNAP NAS in cryptocurrency mining campaign

Experts warn of ongoing attacks targeting QNAP network-attached storage (NAS) devices to abuse them in cryptocurrency…

Overcoming ‘Work from Home’ Security Challenges Security Beyond the VPN

By Krupa Srivatsan, Director, Cybersecurity Product Marketing at Infoblox With the remote working trend on the…

EU leaders aim at boosting defense and security, including cybersecurity

During a video conference of the members of the European Council, EU leaders agreed on a…