Press Release
    February 20, 2025

    Medcrypt Unveils Enhanced Helm SBOM Vulnerability Management Tool: The First Industry-Specific Solution for Medical Device Manufacturers

    Medcrypt, a leader in medical device cybersecurity, has announced enhanced capabilities for Helm, its SBOM…
    Press Release
    February 20, 2025

    Veeam Radically Simplifies Disaster Recovery for Microsoft Hyper-V through Orchestration

    Veeam® Software, the #1 leader by market share in Data Resilience, today announced it’s bringing the…
    Press Release
    February 20, 2025

    Kaspersky Reports Nearly 900 Million Phishing Attempts in 2024 As Cyber Threats Increase

    In 2024, Kaspersky blocked 26% more phishing attempts worldwide compared to the previous year. Cybercriminals…
    Press Release
    February 19, 2025

    Deepwatch Acquires Dassana to Advance Cyber Resilient Security Operations with Continuous Threat Exposure Management

    Deepwatch, the leading AI+Human cyber resilience platform, today announced it has acquired Dassana, a leading provider…
    Press Release
    February 19, 2025

    Pangea Unveils Suite of AI Security Guardrails to Address LLM Software Risks and Accelerate AI Development; Debuts $10,000 Jailbreak Competition

    Pangea, a leading provider of security guardrails, today announced the general availability of AI Guard and Prompt Guard to…
    Press Release
    February 19, 2025

    Exterro Disrupts the Status Quo for Mobile Device Investigations

    Exterro, Inc., the leading provider of data risk management software solutions for e-discovery, digital forensics,…
    Press Release
    February 19, 2025

    Builder.ai Secures and Automates Identities in the Cloud with CyberArk

    CyberArk, the global leader in identity security, today announced that Builder.ai has selected CyberArk to secure identities across its…
    Press Release
    February 18, 2025

    BeyondTrust Releases AI-powered True Privilege Graph to Expose How Attackers Exploit Hidden Paths to Privilege

    BeyondTrust, the global cybersecurity leader protecting paths to privilege, today announced True Privilege™, an AI-powered…
    Press Release
    February 18, 2025

    iProov Study Reveals Deepfake Blindspot Only 0.1% of People Can Accurately Detect AI Generated Deepfakes

    New research from iProov, the world’s leading provider of science-based solutions for biometric identity verification,…
    Press Release
    February 18, 2025

    Lighting Cyber Darkness: Kaspersky Brings Its Latest Security Technology to MWC 2025

    Kaspersky today announces its participation in Mobile World Congress (MWC), taking place in Barcelona, Spain,…
      February 12, 2025

      Bitdefender Reports UAC-0063 Cyber-Espionage Campaign Is Expanding Beyond Central Asia

      A recent report from cybersecurity firm Bitdefender reveals that UAC-0063, a cyber-espionage group previously active in Central Asia, has expanded…
      January 23, 2025

      Cybercriminals Exploiting Microsoft Teams and Email Bombing in New Ransomware Tactics

      Cybercriminals are leveraging Microsoft Teams, email bombings, and remote access tools to orchestrate sophisticated ransomware campaigns, according to recent findings…
      January 20, 2025

      Cisco AI Defense: A Revolutionary Step or a Necessary Complexity in AI Security?

      On 16th January 2025, Cisco hosted a virtual roundtable to launch its highly-anticipated Cisco AI Defense, a platform aimed at…
      January 7, 2025

      Tech Tarik Think Tank Explores the Future of Digital Identities and Trust

      Technology is catapulting us into a future that is ever more connected, efficient and undeniably digital. And based on the…
      November 6, 2024

      Digital Vendetta: The Malicious Impact of Disgruntled Employees

      While businesses pour resources into defending against cyber attacks from the outside, an often-overlooked risk is a far more personal…
      October 10, 2024

      UNODC Report Reveals Criminal Gangs in Asia Getting Big Assist From AI, Crypto, and More

      Criminals, assemble! That appears to be happening in Asia right now, with organised crime syndicates consolidating their groups and expanding…
      October 2, 2024

      Quantum Threat to Cryptography: Experts Warn of an Extinction-Level Event in Digital Trust

      Quantum computing is hitting the headlines, and most of the time for good reasons. As tech players like Microsoft and…
      September 27, 2024

      Dell’s Triple Breach, a Critical Wake-Up Call for Cybersecurity

      Fool me once, shame on you; fool me twice, shame on me. Fool me thrice, shame on both of us.…

      Blogs

        Blogs
        February 4, 2025

        Threat Detection Alone Won’t Cut It: Is Your Organisation Truly Cyber Resilient?

        The idea that cyber threats are evolving isn’t new, but the pace and complexity of threats facing today’s organisations definitely…
        Blogs
        November 18, 2024

        Generative AI & Quantum Risks: Are You Prepared for the Next Wave of Cybersecurity?

        The rise of generative AI is changing the industry and opening doors to creativity and innovation that seemed unattainable just…
        Blogs
        September 26, 2024

        When the Shield Gets Breached: How VPN Vulnerabilities Highlight the Need for Everywhere Security

        With the dust of the remote work revolution finally settling, it’s evident that many businesses have adopted a more hybrid…
        Blogs
        September 18, 2024

        Three Hidden Web Application Vulnerabilities You Need to Know About

        In today’s hyper-connected world, web applications are the backbone of many organisations, driving everything from customer engagement to backend operations.…
        Blogs
        September 5, 2024

        Disrupting the Disruptor: A Step-by-Step Strategy to Stonewall DDoS Attacks

        Service delays are bad for business. Service denial is even worse. Distributed Denial-of-Service (DDoS) attacks can do both, overwhelming a…
        Blogs
        August 27, 2024

        The Criticality of Security: How to Address the Modern Challenge of Securing APIs

        Application Programming Interfaces (API) are dominating the Internet, with successful API requests accounting for 57% of the Internet traffic (dynamic…
        Blogs
        August 13, 2024

        Could Instagram’s New “Feature” Make Stalking Easier?

        Instagram recently rolled out a new “Live Location” feature, which has sparked quite a few discussions, well, mostly concerns regarding…
        Blogs
        August 5, 2024

        The Critical Role of Converged Endpoint Management for Ensuring Enterprise Resilience

        Did you know there are more than 1.4 billion Windows devices currently in use by businesses worldwide? And this figure…