Microsoft warns of Volt Typhoon, latest salvo in global cyberwar

Microsoft published specifics on the Volt Typhoon state-aligned China actor. Experts say raising awareness of threats is critical. The post Microsoft warns of Volt Typhoon, latest salvo in global... Read more »

WithSecure launches ‘outcome-based’ security at Sphere23 conference

At its Sphere23 event in Finland, security company WithSecure unveiled offerings focused on collaboration, business goals and outcomes. The post WithSecure launches ‘outcome-based’ security at Sphere23 conference appeared first... Read more »

Cloudflare releases new AI security tools with Cloudflare One

Cloudflare One has a new suite of AI zero-trust security tools. Read our article to learn more about Cloudflare’s latest announcement and release. The post Cloudflare releases new AI... Read more »

Addigy exposes RSR update gap in 25% of managed macOS devices

Addigy released a report that Apple RSR updates are not being deployed in about 25% of macOS devices within managed environments. Learn more. The post Addigy exposes RSR update... Read more »

Spearphishing report: 50% of companies were impacted in 2022

Barracuda Networks found that spearphishing exploits last year worked to great effect and took days to detect. The post Spearphishing report: 50% of companies were impacted in 2022 appeared... Read more »

EY survey: Tech leaders to invest in AI, 5G, cybersecurity, big data, metaverse

Generative AI is of particular interest to leaders for the benefits of cost savings, efficiency and effectiveness. The post EY survey: Tech leaders to invest in AI, 5G, cybersecurity,... Read more »

Dell’s Project Helix heralds a move toward specifically trained generative AI

On-premises artificial intelligence and specifically trained generative AI are now enterprise trends. Leaders from Dell and NVIDIA and analysts from Forrester Research weigh in. The post Dell’s Project Helix... Read more »

Microsoft Dataverse: Going from Excel to new AI-powered tools

Improvements in the data store for Microsoft’s low-code platform aim to help businesses build on their data. Learn more about Microsoft Dataverse. The post Microsoft Dataverse: Going from Excel... Read more »

Chinese state-sponsored attack uses custom router implant to target European governments

Learn technical details about this cyberattack, as well as Check Point Research’s tips on how to detect and protect against this security threat. The post Chinese state-sponsored attack uses... Read more »

How to manage and share files online using NordLocker

With NordLocker, you can store, manage and share individual files. Learn how with this step-by-step guide. The post How to manage and share files online using NordLocker appeared first... Read more »
Subscribe to our Newsletter