The Rise of Universal ZTNA
The way we work has drastically changed over the last few years. Our data, users, devices, and applications are now...
Read more →The way we work has drastically changed over the last few years. Our data, users, devices, and applications are now...
Read more →A proof-of-concept (PoC) exploit for a critical Veeam Recovery Orchestrator authentication bypass vulnerability tracked as CVE-2024-29855 has been released, elevating the...
Read more →The ‘cybersecurity poverty line’ was a term coined over ten years ago by a Cisco security leader, Wendy Nather. We...
Read more →The potential of artificial intelligence (AI) to help companies measure and optimise their sustainability efforts could be outweighed by the...
Read more →The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert about a recent impersonation scam in which scammers...
Read more →Cybersecurity firm Resecurity has uncovered the latest campaign from the notorious cybercriminal group Smishing Triad targeting smartphone users in Pakistan....
Read more →Traceable AI just released a report on the escalating concerns surrounding API security within the financial services sector. The comprehensive...
Read more →The Labour Party manifesto for the 2024 general election has promised to support the tech and digital sectors through a...
Read more →Please see below comments by Kevin Surace, Chair, Token & “Father of the Virtual Assistant” for your consideration regarding ant...
Read more →In the aftermath of the Synnovis ransomware attack that struck last week, London hospitals continue to struggle to deliver patient...
Read more →Jun 13, 2024NewsroomThreat Intelligence / Mobile Security The threat actor known as Arid Viper has been attributed to a mobile...
Read more →A vulnerability in the Microsoft Windows Error Reporting Service, which was identified and patched three months ago in the March...
Read more →