Quantcast
Channel: Cybersecurity | TechRepublic
Browsing latest articles
Browse All 14 View Live

Thales: For Data Breaches, Cloud Assets are Biggest Cybersecurity Headache

Thales cloud security study shows that 79% of organizations have more than one cloud provider and 75% of companies said they store at least 40% of their sensitive data in the cloud.

View Article



Gartner: Due to stress, half of cyber leaders will change jobs, and a quarter...

Among the strategic propositions in Gartner's 2023-2024 cybersecurity outlook are that organizations need to institute cultural changes to lower pressure on security teams.

View Article

Minimizing Risk Through Proactive Apple Device Management: Addigy

In this Executive Brief by Preetham Gurram, Vice President of Product, Addigy, learn how to proactively manage Apple devices.

View Article

Akamai Report: LockBit, Cl0P Expand Ransomware Efforts

Phishing is so last year: Akamai's report finds that zero-day and one-day vulnerabilities caused a 143% increase in total ransomware victims.

View Article

What is cloud security? Fundamental guide

Don’t expect your network cybersecurity system to meet your needs in cloud computing. To protect your assets in a virtual environment, you need to deploy cloud security.

View Article


7 Best Cloud Security Posture Management (CSPM) Software for 2023

What is the best CSPM tool for your business? Use our guide to review our picks for the best cloud security posture management (CSPM) tools for 2023.

View Article

ExpressVPN Review (2023): Pricing, Features, Pros, & Cons

How much does ExpressVPN cost and is it trustworthy? Read our ExpressVPN review to learn about pricing, security, performance, and more.

View Article

Containing the Breach: Resilience in the Face of a Cybersecurity Crisis

Subscribe to the Cybersecurity Insider Newsletter Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered...

View Article


Infoblox says IT Pros Are Missing This Mega-Threat From Organised Global...

Cyber security threat actor VexTrio is flying under the radar for most APAC region cyber security professionals because it is a web traffic distribution middle man rather than an endpoint source of...

View Article


IAM vs. PAM Solutions: What are the Key Differences?

Explore the differences between IAM and PAM solutions, and learn their respective roles and importance in protecting sensitive data and systems.

View Article
Browsing latest articles
Browse All 14 View Live




Latest Images