-0.2 C
Casper
Saturday, December 6, 2025

TAG

Cyber Security

Forcepoint Launches AI-Powered Data Security Platform for Complete Cloud-to-Endpoint Protection

Forcepoint unveils Forcepoint ONE Data Security, a cloud-managed solution simplifying data protection with zero trust for all businesses. This AI-powered platform offers unified data...

Veeam’s Kasten V7.0: Boosting Cyber Resilience and Innovation

Veeam enhances Kubernetes-native data protection with Kasten V7.0, expanding VM and cloud-native support for Red Hat OpenShift and Microsoft environments and boosting security capabilities...

Maddocks Unveils Privacy Risk Management Tool

Maddocks has launched a new data and privacy tool to assist clients with managing privacy risks under the Privacy Act 1988 (Cth) (Privacy Act)...

Microsoft Vulnerabilities Remain High: BeyondTrust

Elevation of Privilege is the top vulnerability category for the fourth year running, accounting for 40% of all Microsoft vulnerabilities in 2023. BeyondTrust, the worldwide...

Dell Unveils Multicloud, AI Solutions for Security

The expanded data protection portfolio of appliances, software, and AI-as-a-service offerings helps customers build a modern, cyber-resilient foundation. Dell Technologies is expanding its data protection...

Nutanix Study: Public Sector IT Invests in AI, Ransomware Protection, and Efficiency

Hybrid multi-cloud deployments are expected to increase fourfold over the next three years, helping to unlock efficiency, security, and innovation. Nutanix, a leader in hybrid...

Small Business, Big Risks: Prioritizing Password Protection

By implementing robust password protection measures, small businesses can significantly enhance their security posture and safeguard their sensitive data. For World Password Day, Kaspersky...

32 Million Attacks Thwarted on World Password Day

To improve password security on World Password Day, Kaspersky recommends using strong, unique passwords and avoiding common mistakes like reusing the same password or...

Infoblox Discovers ‘Muddling Meerkat’ DNS Operation in China

Muddling Meerkat utilizes sophisticated DNS activities, likely propagated by Chinese state actors, to bypass traditional security measures and probe networks worldwide. Infoblox Inc., a leader...

Qualys Launches Free Service to Help Organizations De-Risk their Business

Qualys offers a FREE 30-day trial of their Enterprise TruRisk Platform to help organizations meet NCSC's patching recommendations. Discover assets, prioritize vulnerabilities, and automate...

Latest news