From our Research Center

- Sponsored by -

2024 Playbook: Identity Security and Cloud Compliance

2024 Playbook: Identity Security and Cloud Compliance

Cloud migration and digital transformation have become more commonplace among enterprises, but these initiatives raise new challenges to protect their data, applications and workloads.  This complex world of cloud security calls for organizations to move towards Zero Standing Privileges and implement measures to protect identities...

- Sponsored by -

- Advertisement -

Looking for an expansive suite of research-driven studies?

Our Research Center is designed to inform, inspire, and elevate your understanding of the latest trends and technologies.

LockBit Ransomware Claims to Hold 33TB of US Federal Reserve Data

LockBit ransomware claims to hold 33TB of US Federal Reserve data hostage. Explore the breach, ongoing negotiations, and potential consequences.

By Conal Cram

Huntress Secures $150 Million, Valuation Soars to $1.5 Billion

Huntress cybersecurity startup secures $150M in funding, reaching a $1.5B valuation. Focused on protecting small businesses, Huntress plans rapid expansion.

By Conal Cram

How Sanaz Yashar Fled Iran, Became an Israeli Spy and Paved Her Way to Becoming a Cybersecurity Leader

Explore Sanaz Yashar on her inspiring journey from fleeing Iran to becoming a cybersecurity pioneer. Discover how her startup, Zafran,…

By Conal Cram

Airbus Expands Cybersecurity Reach with INFODAS Acquisition

Discover how the Airbus acquisition of INFODAS will transform cybersecurity for defense & critical infrastructures globally, ensuring unparalleled protection.

By Conal Cram

Ransomware Onslaught Shakes Texas: Over 20 Local Government Entities Targeted

A massive ransomware attack has wreaked havoc across Texas, impacting over 20 local government entities and leaving them scrambling to…

By Conal Cram

NCSC Honors UK Cybersecurity Experts

In an era where cyber threats loom large, the UK's National Cyber Security Centre (NCSC) has taken a proactive stance…

By Josh Hatton

The essential role of DNS in Today’s Cybersecurity Footprint

In today's digital age, where technology seamlessly integrates into every aspect of our lives, the importance of cybersecurity has skyrocketed.…

By Conal Cram

The Xeno RAT Trojan: A Cybersecurity “Sneakers” Scenario Unfolds on GitHub

In the shadowy realm of cybersecurity, the emergence of the Xeno Remote Access Trojan (RAT) on GitHub marks a chilling…

By Conal Cram

CISA’s Cyber Threat Info Sharing Evolution: From AIS to TIES

In an era where digital threats are constantly evolving, the Cybersecurity and Infrastructure Security Agency (CISA) has been a cornerstone…

By Conal Cram

New GPU Attack in Browsers: A Security Wake-Up Call

A collaborative research effort between Austria's Graz University of Technology and France's University of Rennes has brought to light a…

By Josh Hatton

Cybersecurity: The Power of Incident Response Platforms

In the rapidly evolving landscape of cybersecurity, the need for efficient and effective tools is more pressing than ever. Among…

By Conal Cram

NATO and IBM Unite for Advanced Cybersecurity Solutions: A Leap Forward in Global Defense

In an era where cyber threats loom larger than ever, the recent partnership between NATO and IBM marks a significant…

By Conal Cram

Emerging Tech in Cybersecurity Compliance: A Closer Look at RegTech & LegalTech

In an era where digital transformation is paramount, cybersecurity compliance technologies have become more crucial than ever. The rapid evolution…

By Conal Cram

Coro 3.0: A Modular Cybersecurity Platform Transforms Midmarket Defense

In an era where digital security is paramount, Coro Cyber Security Ltd. has taken a significant leap with the launch…

By Conal Cram

Popular Posts

From our Research Center

- Sponsored by -

2024 Playbook: Identity Security and Cloud Compliance

Cloud migration and digital transformation have become more commonplace among enterprises, but these initiatives raise new challenges to protect their data, applications and workloads.  This...

From our Research Center

- Sponsored by -

2024 Playbook: Identity Security and Cloud Compliance

2024 Playbook: Identity Security and Cloud Compliance

Cloud migration and digital transformation have become more commonplace among enterprises, but these initiatives raise new challenges to protect their data, applications and workloads.  This complex world of cloud security calls for organizations to move towards Zero Standing Privileges and implement measures to protect identities...

- Sponsored by -