Date | Title | Description | Source |
24.04.2024 | D.C. startup founded by ex-Defense Department hacker raises ... | - | bizjournal... |
16.04.2024 | Дорога кибербезопасность к 2025 году... | - | kommersant... |
06.04.2024 | TrojAI Secures $5.75M for AI Protection | TrojAI, a powerhouse in AI security, has locked in $5.75M in Seed funding to fortify enterprise arti... | parsers.vc... |
03.04.2024 | TrojAI Raises $5.75M in Seed Funding to Secure AI in the Ent... | Lee Weiner Appointed CEO of TrojAI
SAINT JOHN, NB and BOSTON, April 3, 2024 /PRNewswire/ -- TrojAI, ... | salamancap... |
31.03.2024 | Exploring the Depths: The Core Components of IT Security | Share
Tweet
Share
Share
Email
In today’s digital age, where technology permeates every aspect of our... | techbullio... |
31.03.2024 | Unlocking the Mystery: Delving Into IT Security’s Inner Work... | Share
Tweet
Share
Share
Email
In the ever-evolving landscape of technology, the importance of IT sec... | techbullio... |
25.03.2024 | Снова про выбор DLP-системы и нужен ли он (выбор)... | Вводное слово
Уважаемый читатель, добрый день!
Для меня публикация статьи на Хабре было закрытием ге... | habr.com/r... |
20.03.2024 | Proofpoint: APAC Employees Are Choosing Convenience, Speed O... | CISOs know best practice information security management comes down to people as much as technology.... | techrepubl... |
19.03.2024 | Как собрать контейнер и не вооружить хакера... | Известно, что с контейнерами бывает огромное количество разнообразных проблем, в том числе, связанны... | habr.com/r... |
13.03.2024 | Medical Device Security Market Size Reach USD 17.49 Billion ... | Medical Device Security Market Size
Surge in cyber-attacks and threats in healthcare industry, rise ... | einpresswi... |
12.03.2024 | Utility Software Market is Dazzling Worldwide | Microsoft, A... | Utility Software market
Stay up to date with Utility Software Market research offered by HTF MI. Che... | einpresswi... |
12.03.2024 | Know Why Tech Support Services Market would See a Stellar Gr... | Tech Support Services market
Stay up to date with Tech Support Services Market research offered by H... | einpresswi... |
12.03.2024 | IAM Security Services Market Is Booming So Rapidly | Major G... | IAM Security Services market
Stay up to date with IAM Security Services Market research offered by H... | einpresswi... |
12.03.2024 | Cloud Encryption Software Market Sees Unprecedented Growth w... | - | globenewsw... |
08.03.2024 | Health IT security Market Size to Worth USD 25.24 billion by... | Health IT Security Market
𝐆𝐥𝐨𝐛𝐚𝐥 𝐇𝐞𝐚𝐥𝐭𝐡 𝐈𝐓 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐌𝐚𝐫𝐤𝐞𝐭 𝐢𝐧𝐜𝐥𝐮𝐝𝐞-IBM Corporation (U.S.), Intel Cor... | einpresswi... |
08.03.2024 | UPDATE - Carahsoft Sponsors Inaugural Billington State and L... | RESTON, Va., March 08, 2024 (GLOBE NEWSWIRE) -- Carahsoft Technology Corp., The Trusted Government I... | einpresswi... |
04.03.2024 | Zero Trust Security Market registering at a CAGR of 18.5% an... | WILMINGTON, DE, UNITED STATES, March 4, 2024 /EINPresswire.com/ -- The zero trust security industry ... | einpresswi... |
24.07.2023 | The top 10 technologies defining the future of cybersecurity | Head over to our on-demand library to view sessions from VB Transform 2023. Register Here
CISOs face... | venturebea... |
24.02.2023 | Experts predict how AI will energize cybersecurity in 2023 a... | AI and machine learning (ML) are becoming attackers’ preferred technologies, from designing maliciou... | venturebea... |
03.01.2023 | Defensive vs. offensive AI: Why security teams are losing th... | Check out all the on-demand sessions from the Intelligent Security Summit here.
Weaponizing artifici... | venturebea... |
28.11.2022 | Where CISOs rely on AI and machine learning to strengthen cy... | Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innov... | venturebea... |
12.01.2022 | Eureka emerges from stealth to secure cloud data stores with... | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI an... | venturebea... |
12.01.2022 | Eureka emerges from stealth to secure cloud data stores with... | Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at the Future of ... | venturebea... |
28.05.2021 | SolarWinds hackers are back with a new mass campaign, Micros... | Enlarge
Getty Images reader comments 46 with 34 posters participating
Share this story
Share on Face... | arstechnic... |
17.08.2020 | New Attacks, Regulations, and Stakes Call for New Security S... | Tim Callan, Senior Fellow, Sectigo
The amount of data generated by the healthcare industry is stagge... | hitconsult... |
08.07.2020 | XM Cyber raises $17 million to simulate and remediate cybera... | XM Cyber, a startup developing a simulation and remediation platform to expose cyberattack vectors, ... | venturebea... |
08.07.2020 | XM Cyber raises $17 million to simulate and remediate cybera... | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI an... | venturebea... |
05.05.2020 | Technology and ethics in the coronavirus economy | Javier Saade Contributor
Share on Twitter
Javier Saade serves on several boards, is venture partner ... | techcrunch... |
31.03.2020 | Axonius raises $58 million to automate device security manag... | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI an... | venturebea... |
31.03.2020 | Axonius raises $58 million to automate device security manag... | Axonius, a cybersecurity startup developing an end-to-end device management platform, today announce... | venturebea... |
14.02.2020 | Here’s your latest reminder that Android security is a joke... | The pile of Android threats to watch out for has been mounting at a pretty rapid clip so far this ye... | bgr.com/te... |
13.02.2020 | Nasty Android malware reinfects its targets, and no one know... | Enlarge reader comments 143 with 80 posters participating, including story author
Share this story
S... | arstechnic... |
27.01.2020 | Why you should be concerned about what you do with your smar... | Share this article:
With the emergence of 5G and an increase in Internet of Things (IoT) devices com... | techpoint.... |
08.01.2020 | 5 reasons why supply chain security must be on your agenda | Presented by Intel
How do you know that the critical parts inside your servers and devices are not p... | venturebea... |
17.12.2019 | How to Avoid Bitcoin Blackmail Scams, Phishing Emails, Sexto... | Airen Petalbert, Tech Times 17 December 2019, 09:12 am
(Photo : Source: André François McKenzie | Un... | techtimes.... |
13.12.2019 | Malnourished healthcare cybersecurity creates ransomware epi... | Following what it terms an unprecedented and unrelenting barrage of ransomware attacks, security ven... | itnews.com... |
06.12.2019 | Small Business Cybersecurity Threats and How to Fix the Fox | Just because your business isn’t on fortune 500 list, it doesn’t guarantee it’s threat free. If you ... | readwrite.... |
19.11.2019 | Privacy – The New Web Battleground? | wp_booster error:
td_api_base::get_key : a component with the ID: single_template_2 Key: show_featur... | techfinanc... |
19.11.2019 | Privacy – The New Web Battleground? | wp_booster error:
td_api_base::get_key : a component with the ID: single_template_2 Key: show_featur... | techfinanc... |
13.11.2019 | Five reasons healthcare data security is at Ebola crisis lev... | https://d1rytvr7gmk1sx.cloudfront.net/wp-content/uploads/2019/05/20190513_Bird_Karen.mp4
For doctors... | techrepubl... |
30.10.2019 | Xhelper Malware Is Anything But Helpful, Infects Over 45K De... | Security researchers at Symantec have reported that more than 45,000 Android devices are infected wi... | androidhea... |
15.10.2019 | Symantec launches new endpoint security solution for busines... | Endpoints are generally the part of any network that is most vulnerable to attack, but as the number... | betanews.c... |
27.09.2019 | 25 Malware-Infected Apps Disguising As Fashion Or Photograph... | Athena Chan, Tech Times 27 September 2019, 06:09 am
More apps have been taken down from the Google P... | techtimes.... |
26.09.2019 | Google Play apps laden with ad malware were downloaded by mi... | Enlarge / Malicious apps discovered by Symantec Threat Intelligence popped up full screen ads, and h... | arstechnic... |
25.09.2019 | Fake veteran hiring site downloads spyware instead of jobs | Enlarge / This site will not make America safer. reader comments 38 with 31 posters participating
Sh... | arstechnic... |
18.09.2019 | Advanced hackers are infecting IT providers in hopes of hitt... | Pixy reader comments 24 with 20 posters participating
Share this story
Share on Facebook
Share on Tw... | arstechnic... |
18.09.2019 | Saudi IT providers hit by supply chain attacks | Researchers at cybersecurity company Symantec have uncovered a new threat group dubbed 'Tortoiseshel... | betanews.c... |
13.09.2019 | Meet the three North Korean hacking groups funding the count... | Enlarge / Hacking for their home country, we guess. reader comments 55 with 45 posters participating... | arstechnic... |
10.09.2019 | Symantec: China-based espionage group continues cyberattacks... | Cybersecurity company Symantec uncovered a new activity of what it claims as China-based espionage g... | backendnew... |
09.09.2019 | China-based espionage group attacks high level targets | The China-based Thrip group was first exposed in 2018 and has carried out attacks across South East ... | betanews.c... |
29.08.2019 | Google Play apps with 1.5 million downloads drained batterie... | Enlarge reader comments 60 with 55 posters participating
Share this story
Share on Facebook
Share on... | arstechnic... |
16.07.2019 | Symantec launches new zero trust cloud access security techn... | Increasing volumes of business network traffic are now directed at the cloud and companies need a co... | betanews.c... |
15.07.2019 | Уязвимость WhatsApp и Telegram позволяет хакерам манипулиров... | Александра Кукуть 15 июля 2019, 16:55 Уязвимость WhatsApp и Telegram позволяет хакерам манипулироват... | dev.by/new... |
15.07.2019 | Symantec reveals WhatsApp and Telegram exploit that gives ha... | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI an... | venturebea... |
15.07.2019 | Symantec reveals WhatsApp and Telegram exploit that gives ha... | Cybersecurity company Symantec found an exploit that could allow WhatsApp and Telegram media files —... | venturebea... |
28.06.2019 | NowSecure raises $15 million to automate mobile app security... | The growth in popularity of mobile apps hasn’t kept pace with app security improvements — quite the ... | venturebea... |
28.06.2019 | NowSecure raises $15 million to automate mobile app security... | Did you miss a session from GamesBeat Summit 2022? All sessions are available to stream now. Learn m... | venturebea... |
28.06.2019 | 5 tips to improve your company's IT security | According to a 2018 IBM study, the average cost of a data breach for a U.S. company is $7.91 million... | betanews.c... |
26.06.2019 | Iranian state hackers reload their domains, release off-the-... | Enlarge
Getty Images reader comments 98 with 42 posters participating
Share this story
Share on Face... | arstechnic... |
24.06.2019 | Over half of enterprises think security is lagging behind cl... | According to the results of a new survey 54 percent of enterprises think their organization's securi... | betanews.c... |
20.06.2019 | Nation-sponsored hackers likely carried out hostile takeover... | Enlarge
DeviantArt100ManoWar / MAD Magazine reader comments 41 with 33 posters participating
Share t... | arstechnic... |
15.06.2019 | Hackers behind dangerous oil and gas intrusions are probing ... | Enlarge / Power Lines in Page, Arizona
IIP Photo Archive reader comments 166 with 77 posters partici... | arstechnic... |
11.06.2019 | Some sage security advice after Radiohead’s unreleased music... | Bad news: Radiohead was hacked.
Last week, a hacker stole the band’s lead singer Thom Yorke’s privat... | techcrunch... |
11.06.2019 | The Cyberlaw Podcast: 'Call Me a Fascist Again and I’ll Get ... | We kick off Episode 267 with Gus Hurwitz reading the runes to see whether a 50-year Chicago winter f... | lawfareblo... |
21.05.2019 | The Cyberlaw Podcast: Turning the Tables on Baker | With apologies for the late post, Episode 263 of The Cyberlaw Podcast tells the sad tale of another ... | lawfareblo... |
15.05.2019 | Why Are the U.S.'s Cyber Secrets Getting Stolen? Because Chi... | The New York Times published a major story last week, drawing on research from the cybersecurity com... | lawfareblo... |
25.04.2019 | A new cryptocurrency mining malware uses leaked NSA exploits... | Two years after highly classified exploits built by the National Security Agency were stolen and pub... | techcrunch... |
27.03.2019 | A rogue’s gallery of bad actors is exploiting that critical ... | Enlarge
iStock / Getty Images reader comments 76 with 58 posters participating
Share this story
Shar... | arstechnic... |
26.03.2019 | Former NEA partner Jon Sakoda takes the wraps off his new, C... | Jon Sakoda needed to decompress, he says. The founder-turned-venture investor had logged a dozen yea... | techcrunch... |
22.03.2019 | 6 Emerging Cyber Threats to Lookout for in 2019 | 2018 showed us an accelerated growth in cyber threat activities. Data breaches, attacks using malici... | readwrite.... |
18.03.2019 | Symantec: Cybercriminals shift to formjacking after cryptoja... | Cybercriminals are not resorting to formjacking, a new form of digital information theft, after losi... | backendnew... |
16.03.2019 | CISOs: You need to manage by ‘walking around’ | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI an... | venturebea... |
16.03.2019 | CISOs: You need to manage by ‘walking around’ | Chief information security officers (CISOs) today have replaced chief information officers (CIOs) as... | venturebea... |
14.03.2019 | The 3 Biggest Threats Healthcare Data Security is Facing Rig... | The year 2017 suffered the greatest ransomware attack in the history of the internet. The WannaCry r... | readwrite.... |
04.03.2019 | An Ever-Present Cybersecurity Threat in the IoT, Says Symant... | Symantec CEO Greg Clark says that there are many new cybersecurity threats showing up including thre... | webpronews... |
03.03.2019 | Researchers obtain a command server used by North Korean hac... | In a rare move, government officials have handed security researchers a seized server believed to be... | techcrunch... |
21.02.2019 | Popularity of ‘Formjacking’ Surges, Symantec Research Shows... | Cybercriminals are implanting code to access payment card numbers across thousands of websites onlin... | digit.fyi/... |
20.02.2019 | Formjacking is the new cash generator for cybercriminals | The latest Symantec Annual Threat Report reveals that cybercriminals are continuing to follow the mo... | betanews.c... |
19.02.2019 | Senseon raises $6.4M to tackle cybersecurity threats with an... | Darktrace helped pave the way for using artificial intelligence to combat malicious hacking and ente... | techcrunch... |
29.01.2019 | Symantec boosts its endpoint security offering | Sophisticated attackers are increasingly taking advantage of the complexity of endpoint environments... | betanews.c... |
08.01.2019 | Comcast debuts a subscription service to protect against thr... | Comcast is putting AI to work to protect its customers’ home networks. At the Consumer Electronics S... | techcrunch... |
21.12.2018 | Automated Cyber Attacks Are the Next Big Threat. Ever Hear o... | December 21, 2018 8 min read
Opinions expressed by Entrepreneur contributors are their own.
If you t... | entreprene... |
18.12.2018 | Closing the Global Cyber Enforcement Gap | Last month, more than 50 countries and over 200 major corporations and organizations came together t... | lawfareblo... |
05.12.2018 | Symantec launches neural network device to protect critical ... | Operational technology is critical in areas like energy, oil and gas, manufacturing, and transportat... | betanews.c... |
08.11.2018 | Symantec Acquires Javelin Networks | MOUNTAIN VIEW, Calif.–(BUSINESS WIRE)–Symantec Corp. (NASDAQ: SYMC) today announced the acquisition ... | citybizlis... |
08.11.2018 | Symantec Acquires Javelin Networks | MOUNTAIN VIEW, Calif.–(BUSINESS WIRE)–Symantec Corp. (NASDAQ: SYMC) today announced the acquisition ... | archive.ci... |
07.11.2018 | Term Sheet — Wednesday, November 7 | 5 Qs WITH A DEALMAKER
Good morning, Term Sheet readers.
Paid Content You can't secure what you can't... | fortune.co... |
02.11.2018 | Old School 'Sniffing' Attacks Can Still Reveal Your Browsing... | Most modern browsers—such as Chrome, Firefox, and Edge, and even browsers such as FuzzyFox and Deter... | vice.com/e... |
10.10.2018 | Microsoft fixes Window 10 file deletion issue | Microsoft claims to have taken care of the inadvertent file deletion issue affecting users upgrading... | itnews.com... |
09.10.2018 | Symantec deepens its cloud-protection services | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI an... | venturebea... |
09.10.2018 | Symantec delivers integrated approach to cloud security | Companies increasingly rely on cloud applications and infrastructure for their critical systems. Pro... | betanews.c... |
09.10.2018 | Symantec deepens its cloud-protection services | Cybersecurity firm Symantec announced expansions to its cloud security portfolio that are designed t... | venturebea... |
08.10.2018 | NHS Digital to ignore IT security recommendations despite Wa... | NHS Digital is set to ignore the IT security recommendations of its own chief information officer, W... | computing.... |
25.09.2018 | Symantec brings improved data loss prevention and rights man... | Protecting data in the cloud and ensuring compliance with rules and regulations is a complex task. T... | betanews.c... |
21.09.2018 | Last Chance for Tickets to Barrier Networks’ Latest Cyber Se... | Cybersecurity specialist Barrier Networks is issuing a ‘final call’ for registrations to its event o... | digit.fyi/... |
18.09.2018 | Symantec offers free anti-spoofing services to US political ... | Symantec is the latest private security company to offer its expertise to vulnerable political targe... | techcrunch... |
07.08.2018 | How to win (or at least not lose) the war on phishing? Enlis... | Enlarge / Coming to a device near you: Freddi Fish 666—the Phishing Apocalypse.
collage by Sean Gall... | arstechnic... |
25.07.2018 | G Suite and Google Cloud get FIDO security key support, cont... | Google kicked off the second day of its Cloud Next conference in San Francisco the same way as yeste... | venturebea... |
25.07.2018 | G Suite and Google Cloud get FIDO security key support, cont... | Did you miss a session from GamesBeat Summit 2022? All sessions are available to stream now. Learn m... | venturebea... |
18.07.2018 | Some vote-counting computers came with a critical flaw that ... | Photo by Ethan Miller/Getty Images
Advertisement
Some of the computers used for tabulating votes and... | businessin... |