<
>

Posts in Threat detection & defence

Hillstone Network Microsegmentation

Microsegmentation has become the panacea for securing cloud-based data centres. Find out what it is and how CloudHive by Hillstone can help:  

Adyen’s Innovative Authentication Solution Boosts Conversion Rates

Adyen (AMS: ADYEN), the global financial technology platform of choice for leading businesses, announces that it has further advanced its digital authentication solution, with ongoing pilots...

Qualys March 2023 – Patch Tuesday

Bharat Jogi, Director, Vulnerability and Threat Research, Qualys Microsoft Patches for March 2023 Microsoft has addressed 101 vulnerabilities in the month of March, including 22 Microsoft Edge...

Mitigating Cyber Attacks Through Micro-Segmentation

If you have already implemented micro-segmentation for your network, you are one step ahead! If not, it’s time for you to consider doing so, sooner rather than later. A well-protected...

The Race to Secure Your Data: Quantum Computing and Beyond

As the technological landscape shifts, so too does the difficulty of ensuring the security of our information. Quantum computing is a major concern since it might theoretically crack our existing...

Last Year, Kaspersky Blocked About 1 Million SEA Financial Phishing Assaults

Phishing is one of the most prevalent forms of cybercrime due to the minimal effort required and the fact that it really works. It’s usually built around an inherently simple scheme: using...

Mitigate Risks to Cloud Workloads with CWPP

Organisations have the potential to be exposed and are vulnerable to a host of new cloud-native attack vectors when they move their workloads to a public cloud infrastructure. Over the years, tried...

ForgeRock - No More Passwords!

ForgeRock® (NYSE: FORG), a global digital identity leader, today announced ForgeRock Enterprise Connect Passwordless, a new passwordless authentication solution that eliminates the need for users...

Cybercriminals Use Three New Phishing Techniques on Internet Users

Barracuda, a trusted partner and leading provider of cloud-enabled security solutions, has uncovered three new phishing tactics cybercriminals are using to trick users, bypass security measures and...

Recurring Data Breaches in Malaysia - Plain Ignorance or Just Weak Enforcement

Personal information is extremely valuable in the modern digital age, yet if it is not safeguarded adequately, it can result in catastrophic data breaches that expose millions of people. In 2020, a...

Pages

Subscribe to RSS - Threat detection & defence