Home Cybersecurity

Cybersecurity

On each category you can set a Category template style, a Top post style (grids) and a module type for article listing. Also each top post style (grids) have 5 different look style. You can mix them to create a beautiful and unique category page.

Whitepaper: Lessons Learned from a Decade of Data Breaches

F5 Networks has released a whitepaper which focuses on data breaches, primary root causes, targets, visibility and general options that lead to improved security...

Cisco announces the new Network Assurance Engine for IBN

At the Cisco Live event in Barcelona, the company has announced its new three assurance software products, described as the second wave of intent-based...

AWS adds Sqrrl to its list of acquired companies

Amazon Web Services has acquired Sqrrl, adding it to the list of recently acquired security-oriented companies. The acquisition has been reported by Sqrrl CEO, Mark...

GDPR attack plan: what you need to know video course

Varonis, a security software company has issued a new course which focuses on the upcoming General Data Protection Regulation (GDPR). With over two hours of...

Gartner predicts increased spending on cloud, cybersecurity, and analytics

Gartner has released its latest survey which suggests that cloud solutions, cybersecurity, and analytics will be the top technologies that will get new or...

ETSI Zero touch Group starts to work on 5G network automation

ETSI's Zero touch network and Service Management Industry Specification Group (ZSM ISG) has elected its leadership team, held its first meeting and started work...

Webinar: GDPR compliance and maintaining security in the cloud

The latest webinar which talks about compliance regulation and maintaining such strict compliance security in the cloud has been posted online. With the constant rise...

Intel and AMD fixing Meltdown and Spectre CPU bugs

Both Intel and AMD are now working hard to fix the recently discovered Meltdown and Spectre issues and have shed a bit more information...

Dell EMC releases patches for data protection products

Recent vulnerabilities that affect certain Dell EMC data protection products have been identified and patches are now available for download. A set of three vulnerabilities...

Cisco Encrypted Traffic Analytics (ETA) now generally available

While encrypted traffic does increase security, there are still ways that it can be compromised. Cisco has just announced that its Encrypted Traffic Analytics...
- Advertisement -

LATEST NEWS

MUST READ