Zephyrnet Logo

Tag: endpoint security

Critical Infrastructure Security: Observations From the Front Lines

COMMENTARYRecent headlines around Volt Typhoon, a state-sponsored Chinese threat actor targeting US critical infrastructure, have caused alarm over attacker dwell time and put critical infrastructure security in...

Top News

Beyond Identity Introduces Device360 for Security Risk Visibility Across All Devices

PRESS RELEASENEW YORK , Feb. 21, 2024 /PRNewswire/ -- Beyond Identity, the leading provider of passwordless, phishing-resistant MFA, today announced the release of its new Device360 solution for continuous...

Palo Alto Networks Launches Cortex Platform Offer

PRESS RELEASESANTA CLARA, Calif., Feb. 21, 2024 /PRNewswire/ -- Palo Alto Networks (NASDAQ: PANW) today announced a new Cortex platform offer for endpoint security to help...

1Password Expands Security Capabilities with Acquisition of Endpoint Security Platform Kolide

1Password, the popular password manager, has recently announced its acquisition of Kolide, an endpoint security platform. This move is aimed at expanding 1Password's security...

The Biggest Fraud Threats For The Online Subscription Industry

The astronomical rise of subscription businesses represents one of the most disruptive online business shifts in history. Fueled by advancements in recurring billing technology...

7 Data Security Best Practices for Your Enterprise – DATAVERSITY

When it comes to cybersecurity, some enterprises still take it with a grain of salt. But make no mistake about it: No one is...

Adapting to the Post-SolarWinds Era: Supply Chain Security in 2024

COMMENTARYIn December 2020, the SolarWinds attack sent shockwaves around the world. Attackers gained unauthorized access to SolarWinds' software development environment, injected malicious code into...

MAS Public Cloud Guidelines: A Deep Dive into its Impact on Cloud Security – Fintech Singapore

Amidst a rapidly digitalising world, accelerated further by the COVID-19 pandemic, cloud technology has become a pivotal cornerstone for businesses worldwide. Recently, the Monetary...

7 Essential Backup Strategy Best Practices

Nov 6, 2023 Image: Unsplash/Art Wall KittenprintAlthough production storage is becoming more dependable and durable, it is more vital than ever to create and...

The history of malware: A primer on the evolution of cyber threats – IBM Blog

The history of malware: A primer on the evolution of cyber threats - IBM Blog <!----> ...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?