Cost of a Data Breach peaked during Pandemic: IBM
Data breaches now cost surveyed companies $4.24 million per incident on average – the highest cost in the 17-year history of the report, according to the annual Cost of a…
Data breaches now cost surveyed companies $4.24 million per incident on average – the highest cost in the 17-year history of the report, according to the annual Cost of a…
IT security, cloud migration and automation have become top three priority for IT professionals, according to a new report from IT and security management solutions provider Kaseya. According to the…
Kaspersky Password Manager has implemented several improvements across all platforms and enhanced control over password strength. The Windows version has become more convenient and transparent, with new features to allow…
Cyber security start-up Astra Security has rolled out an industry-first initiative of Publicly Verifiable Security Audit Certificates. This one-of-a-kind initiative will help Astra Security’s customers to boost transparency and trust…
McAfee has released findings from the ‘2021 Consumer Security Mindset Survey’, revealing how Indians are ensuring their online security in an increasingly digital-first world with an accelerated adoption of connected…
IBM is working with Parle Products Pvt Ltd (Parle), the largest selling biscuit brand in India, to help it more quickly and effectively bring its products to market by leveraging…
SAP and Onapsis have jointly released a cyber threat intelligence report providing actionable information on how malicious threat actors are targeting and potentially exploiting unprotected mission-critical SAP applications. The companies…
By Glen Pendley, Deputy CTO, Tenable “In 2021, 5G will bring boundless opportunity, both in introducing new ways to connect and elevating the standard for securing disparate infrastructure. Once 5G…
In its ‘Disruptive Future: 2021’ NTT Ltd outlines five key disruptive technology trends that hold promise to help companies realize safety and security, support sustainable growth and reduce environmental loads:…
81% of CIOs say traditional perimeter-based security approaches have become obsolete As business IT environments become more complex with applications running on multiple cloud hosting environments, work teams distributed at…
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More