From our Research Center

- Sponsored by -

2024 Playbook: Identity Security and Cloud Compliance

2024 Playbook: Identity Security and Cloud Compliance

Cloud migration and digital transformation have become more commonplace among enterprises, but these initiatives raise new challenges to protect their data, applications and workloads.  This complex world of cloud security calls for organizations to move towards Zero Standing Privileges and implement measures to protect identities...

- Sponsored by -

- Advertisement -

Looking for an expansive suite of research-driven studies?

Our Research Center is designed to inform, inspire, and elevate your understanding of the latest trends and technologies.

LockBit Ransomware Claims to Hold 33TB of US Federal Reserve Data

LockBit ransomware claims to hold 33TB of US Federal Reserve data hostage. Explore the breach, ongoing negotiations, and potential consequences.

By Conal Cram

Huntress Secures $150 Million, Valuation Soars to $1.5 Billion

Huntress cybersecurity startup secures $150M in funding, reaching a $1.5B valuation. Focused on protecting small businesses, Huntress plans rapid expansion.

By Conal Cram

How Sanaz Yashar Fled Iran, Became an Israeli Spy and Paved Her Way to Becoming a Cybersecurity Leader

Explore Sanaz Yashar on her inspiring journey from fleeing Iran to becoming a cybersecurity pioneer. Discover how her startup, Zafran,…

By Conal Cram

Airbus Expands Cybersecurity Reach with INFODAS Acquisition

Discover how the Airbus acquisition of INFODAS will transform cybersecurity for defense & critical infrastructures globally, ensuring unparalleled protection.

By Conal Cram

IOActive Redefines Cyber Security with Cutting-Edge Lab in Cheltenham

Renowned company,  IOActive has revealed plans to establish an expansive and cutting-edge cyber security laboratory in Cheltenham. This remarkable development…

By Josh Hatton

The essential role of DNS in Today’s Cybersecurity Footprint

In today's digital age, where technology seamlessly integrates into every aspect of our lives, the importance of cybersecurity has skyrocketed.…

By Conal Cram

The Xeno RAT Trojan: A Cybersecurity “Sneakers” Scenario Unfolds on GitHub

In the shadowy realm of cybersecurity, the emergence of the Xeno Remote Access Trojan (RAT) on GitHub marks a chilling…

By Conal Cram

CISA’s Cyber Threat Info Sharing Evolution: From AIS to TIES

In an era where digital threats are constantly evolving, the Cybersecurity and Infrastructure Security Agency (CISA) has been a cornerstone…

By Conal Cram

Lycetts Unveils New Cyber Safety Tool for Enhanced Business Security

In an era where digital threats loom large, Lycetts has taken a significant leap forward in business security with the…

By Conal Cram

New GPU Attack in Browsers: A Security Wake-Up Call

A collaborative research effort between Austria's Graz University of Technology and France's University of Rennes has brought to light a…

By Josh Hatton

NATO and IBM Unite for Advanced Cybersecurity Solutions: A Leap Forward in Global Defense

In an era where cyber threats loom larger than ever, the recent partnership between NATO and IBM marks a significant…

By Conal Cram

Emerging Tech in Cybersecurity Compliance: A Closer Look at RegTech & LegalTech

In an era where digital transformation is paramount, cybersecurity compliance technologies have become more crucial than ever. The rapid evolution…

By Conal Cram

Coro 3.0: A Modular Cybersecurity Platform Transforms Midmarket Defense

In an era where digital security is paramount, Coro Cyber Security Ltd. has taken a significant leap with the launch…

By Conal Cram

Zero-Trust Over VPN: Securing IoT’s Future

The Rise of Lateral Movement Attacks The IoT landscape has become a battleground for network security, with "lateral movement" emerging…

By Conal Cram

Popular Posts

From our Research Center

- Sponsored by -

2024 Playbook: Identity Security and Cloud Compliance

Cloud migration and digital transformation have become more commonplace among enterprises, but these initiatives raise new challenges to protect their data, applications and workloads.  This...

From our Research Center

- Sponsored by -

2024 Playbook: Identity Security and Cloud Compliance

2024 Playbook: Identity Security and Cloud Compliance

Cloud migration and digital transformation have become more commonplace among enterprises, but these initiatives raise new challenges to protect their data, applications and workloads.  This complex world of cloud security calls for organizations to move towards Zero Standing Privileges and implement measures to protect identities...

- Sponsored by -