State-sponsored cyberespionage campaigns continue targeting journalists and media

Journalists have information that makes them particularly interesting for state-sponsored cyberespionage threat actors. Learn more about these threats now. The post State-sponsored cyberespionage campaigns continue targeting journalists and media... Read more »

20 VPN subscriptions and bundles on sale now

Keep your internet connection behind lock and key with these 20 VPN subscriptions and bundles offered through TechRepublic Academy. The post 20 VPN subscriptions and bundles on sale now... Read more »

Secure remote help can be powerful but may not be cheap

Use the new Windows Remote Help app to support remote and hybrid employees from Microsoft Endpoint Manager securely without a VPN. The post Secure remote help can be powerful... Read more »

Nearly half of enterprise endpoint devices present significant security risks

Organizations are struggling to manage devices and stay ahead of vulnerabilities, patches and attacks, according to a new report from Adaptiva and the Ponemon Institute. The post Nearly half... Read more »

Critical infrastructure IIoT/OT security projects suffer high rates of failure

Barracuda found that 93% of organizations in the areas of IIoT/OT have experienced a failed security project. The post Critical infrastructure IIoT/OT security projects suffer high rates of failure... Read more »

6 best Acronis integrations

Choosing additional security functionality for your software has never been easier. Here are six of the best Acronis integrations for your solutions. The post 6 best Acronis integrations appeared... Read more »

Acronis vs Backblaze: Backup service provider comparison

Acronis and Backblaze are some of the most popular backup services available, but their ideal use cases differ. See which solution is the best fit for your business. The... Read more »

How security vulnerabilities pose risks for healthcare organizations

An analysis by Cyber SecurityWorks uncovered 624 vulnerabilities that cybercriminals could exploit to target healthcare facilities. The post How security vulnerabilities pose risks for healthcare organizations appeared first on... Read more »

Cybersecurity, data protection and inadequate IT budgets are top of mind for IT professionals

Outdated legacy systems is also on the list of challenges Kaseya’s annual IT operations benchmark report for 2022. The post Cybersecurity, data protection and inadequate IT budgets are top... Read more »

Apple to tackle the cybersurveillance industry with new Lockdown mode

The optional feature will be launched next fall to protect users who are particularly at risk of being targeted by advanced cyberattacks. The post Apple to tackle the cybersurveillance... Read more »
Subscribe to our Newsletter