From our Research Center

- Sponsored by -

2024 Playbook: Identity Security and Cloud Compliance

2024 Playbook: Identity Security and Cloud Compliance

Cloud migration and digital transformation have become more commonplace among enterprises, but these initiatives raise new challenges to protect their data, applications and workloads.  This complex world of cloud security calls for organizations to move towards Zero Standing Privileges and implement measures to protect identities...

- Sponsored by -

Looking for an expansive suite of research-driven studies?

Our Research Center is designed to inform, inspire, and elevate your understanding of the latest trends and technologies.

LockBit Ransomware Claims to Hold 33TB of US Federal Reserve Data

LockBit ransomware claims to hold 33TB of US Federal Reserve data hostage. Explore the breach, ongoing negotiations, and potential consequences.

By Conal Cram

Huntress Secures $150 Million, Valuation Soars to $1.5 Billion

Huntress cybersecurity startup secures $150M in funding, reaching a $1.5B valuation. Focused on protecting small businesses, Huntress plans rapid expansion.

By Conal Cram

How Sanaz Yashar Fled Iran, Became an Israeli Spy and Paved Her Way to Becoming a Cybersecurity Leader

Explore Sanaz Yashar on her inspiring journey from fleeing Iran to becoming a cybersecurity pioneer. Discover how her startup, Zafran,…

By Conal Cram

Airbus Expands Cybersecurity Reach with INFODAS Acquisition

Discover how the Airbus acquisition of INFODAS will transform cybersecurity for defense & critical infrastructures globally, ensuring unparalleled protection.

By Conal Cram

The Critical Connection: How Digital Trust Paves the Way for Augmented Reality in Healthcare

Digital trust is the foundation for augmented reality's success in revolutionising healthcare. This article delves into the importance of ensuring…

By Conal Cram

NCSC Honors UK Cybersecurity Experts

In an era where cyber threats loom large, the UK's National Cyber Security Centre (NCSC) has taken a proactive stance…

By Josh Hatton

The essential role of DNS in Today’s Cybersecurity Footprint

In today's digital age, where technology seamlessly integrates into every aspect of our lives, the importance of cybersecurity has skyrocketed.…

By Conal Cram

NATO and IBM Unite for Advanced Cybersecurity Solutions: A Leap Forward in Global Defense

In an era where cyber threats loom larger than ever, the recent partnership between NATO and IBM marks a significant…

By Conal Cram

Emerging Tech in Cybersecurity Compliance: A Closer Look at RegTech & LegalTech

In an era where digital transformation is paramount, cybersecurity compliance technologies have become more crucial than ever. The rapid evolution…

By Conal Cram

New GPU Attack in Browsers: A Security Wake-Up Call

A collaborative research effort between Austria's Graz University of Technology and France's University of Rennes has brought to light a…

By Josh Hatton

Zero-Trust Over VPN: Securing IoT’s Future

The Rise of Lateral Movement Attacks The IoT landscape has become a battleground for network security, with "lateral movement" emerging…

By Conal Cram

The Rise of WAAP for Application Protection

In today's digital era, cybersecurity is more critical than ever. As businesses increasingly rely on web applications and APIs, the…

By Conal Cram

UK and US Lead Global AI Security Guidelines Initiative

Introduction to the AI Security Guidelines The 'Guidelines for Secure AI System Development' have been meticulously crafted by the UK's…

By Conal Cram

EU Cybersecurity Certification: Expanding Scope to Encompass Tech Giants to Banks

The European Union (EU) is at a pivotal point in enhancing its digital landscape, particularly in the realm of cybersecurity.…

By Conal Cram

Popular Posts

From our Research Center

- Sponsored by -

2024 Playbook: Identity Security and Cloud Compliance

Cloud migration and digital transformation have become more commonplace among enterprises, but these initiatives raise new challenges to protect their data, applications and workloads.  This...

From our Research Center

- Sponsored by -

2024 Playbook: Identity Security and Cloud Compliance

2024 Playbook: Identity Security and Cloud Compliance

Cloud migration and digital transformation have become more commonplace among enterprises, but these initiatives raise new challenges to protect their data, applications and workloads.  This complex world of cloud security calls for organizations to move towards Zero Standing Privileges and implement measures to protect identities...

- Sponsored by -