Author Details

Understand the Gramm-Leach-Bliley Act

When it comes to data protection acts, the Gramm-Leach-Bliley Act is one of the more important ones to understand....

Read More
The Role of a vCISO in Enterprise Security

Cybercriminals try to find all ways to circumvent security solutions and the defensive measures adopted by organizations, and hence...

Read More
What Is FISMA Compliance

In today’s digital world, information is the most important asset of many companies. This forms much of their business...

Read More
Security & Privacy Concerns in IoT Devices

Today in the IoT era, both competing systems and services are streamlined in various areas of the world, and...

Read More
New Hybrid Computing, Same Security Concerns

Pulse Secure, with the cooperation of IDG Connect has released its 2019 State of Enterprise Secure Access research paper,...

Read More
Modular Malware In The Nutshell

We are in the age of computing where programs are growing to a point towards feature-richness at best and...

Read More
S&P Cautioned The US, Huawei Ban Bad For US Firms

In the ongoing trade war between the United States and China, embattled electronics firm Huawei found an ally from...

Read More
Evernote Critical Flaw Could Have Impacted Millions of Users

A critical flaw that affected Evernote’s web clipper extension for Chrome could have impacted millions of users. Reports say...

Read More
Aviation Equipment Major ASCO Victim of Ransomware Attack

The Belgian manufacturer of aeronautical equipment ASCO was forced to close its operations in Belgium, Germany, Canada and the...

Read More
Telegram Recovers from DDoS Attack

Telegram Messenger, which had suffered a DDoS (Distributed Denial of Service) attack recently, has reportedly recovered from the same...

Read More

Page 2 of 88


Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password