Regardless of what 2023 holds in store for the economy, your organization’s financial commitment to supporting OT cybersecurity efforts is being decided now. In the public sector, much of... Read more »
Digital forensics is used to find, examine and analyze digital evidence that can serve in criminal investigations, but also in incident response, investigations of data breaches, to unearth insider... Read more »
Oxeye revealed five predictions expected to shape enterprise security spending in 2023. The predictions follow industry-wide research, which shows the industry is shifting away from legacy software infrastructure and... Read more »
LogRhythm has unveiled a series of expanded capabilities and integrations for its security operations solutions. The updates propel LogRhythm’s ability to be a force multiplier for overwhelmed security teams... Read more »
Box has released new enhancements to the Box for Salesforce integration on Salesforce AppExchange, that helps businesses connect teams to their content so they can work securely from anywhere.... Read more »
Valeo and C2A Security have unveiled a strategic collaboration to enhance Valeo’s cybersecurity offerings on their products in development and continuous operations. The new partnership addresses the industry’s need... Read more »
Keysight Technologies has collaborated with Qualcomm Technologies to establish an end-to-end 5G non-terrestrial network (NTN) connection. Based on this successful demonstration of call signaling and data transfer using orbit... Read more »
GuardKnox is collaborating with Wind River to enable developers to build secure containerized applications for software-defined vehicles of the future. The combination of GuardKnox’s SOA (Service Oriented Architecture) core... Read more »
Will your organization fall apart if you don’t switch from a VPN to a zero trust network access (ZTNA) solution in the near future? I’m here to tell you... Read more »
Every SOC on the planet is grappling with the challenges of integrating detection techniques and response processes for public cloud computing. This presentation by Rich Mogull, SVP Cloud Security... Read more »