By Scott Register, Vice President, Security Solutions, Keysight Technologies We’ve all seen the rush to deploy the new wave of…
Understand the limits of data consent when sending cold emails By Tim Green, Cybersecurity Specialist Cold emailing is an important…
Akamai Technologies has introduced the Akamai Hunt security service that enables customers to capitalize on the infrastructure of Akamai Guardicore…
CrowdStrike has forecast fiscal year 2024 revenue to come in above market estimates, the latest sign that spending on cyber…
The hacker behind the HDFC Bank subsidiary breach was also behind the Acer Inc. data breach that took place a…
It’s obvious that all of us would love to have access to the social media accounts of our loved ones…
Persona has launched Graph to help businesses stop online identity fraud. Leveraging advanced link analysis technology and a configurable query,…
Mar 08, 2023Ravie LakshmananZero-Day / BYOVD Attack The North Korea-linked Lazarus Group has been observed weaponizing flaws in an undisclosed…
Cyril Pourrat is head of procurement at BT Sourced, a separate procurement business within telco giant BT. He describes the…
by Anna Collard, SVP of Content Strategy and Evangelist at KnowBe4 Africa I always enjoyed drawing, and as a kid…
Britain will make another attempt to reform its data protection law with the objective of easing the compliance burden for…
[ This article was originally published here ] Spoiler alert: the obvious answer is not always the correct one! Migrating…