10-point plan for securing employee health data collected for COVID-19 prevention

10-point plan for securing employee health data collected for COVID-19 prevention The COVID-19 pandemic has dramatically…

Businesses prioritize security and collaboration tools to manage sustained remote work environments

Businesses prioritize security and collaboration tools to manage sustained remote work environments 77 percent of IT…

Securing human resources from cyber attack

Securing human resources from cyber attack As COVID-19 forced organizations to re-imagine how the workplace operates…

Black Hat 2020: Fixing voting – boiling the ocean?

Black Hat 2020: Fixing voting – boiling the ocean? With the big voting day rapidly approaching, can…

CyberSaint CyberStrong updates make cybersecurity resiliency an enabler of business strategy

CyberSaint CyberStrong updates make cybersecurity resiliency an enabler of business strategy CyberSaint announced new CyberStrong platform…

MiniTool Power Data Recovery 9.0: Improved scanning speed and data recovery results

MiniTool Power Data Recovery 9.0: Improved scanning speed and data recovery results MiniTool Software has released…

Leading tech companies certify IoT devices via ioXt Alliance

Leading tech companies certify IoT devices via ioXt Alliance The ioXt Alliance announced that major technology…

Deep Instinct contracts with T-Systems to continue expansion into EMEA

Deep Instinct contracts with T-Systems to continue expansion into EMEA Deep Instinct is continuing its strategic…

Discounted CISSP exam prep pricing is back

Discounted CISSP exam prep pricing is back Challenging times call for exceptional measures, and (ISC)² is…

SAFE Phish: Phish testing and training redefined

SAFE Phish: Phish testing and training redefined Mimecast announced an industry changing capability that will allow…