McAfee Appoints Peter Leav as CEO
Cybersecurity company McAfee has appointed has appointed Peter Leav to the role of Chief Executive Officer (CEO), effective February 3, 2020. Leav will succeed Chris Young, who has decided to…
Cybersecurity company McAfee has appointed has appointed Peter Leav to the role of Chief Executive Officer (CEO), effective February 3, 2020. Leav will succeed Chris Young, who has decided to…
The ‘Made in India’ cloud-based healthcare solution encourages healthier and more vibrant communities across the country. HPE announced that its eHealth Centers, which offer a digital healthcare solution, have collectively…
The scientific consensus is clear. The world confronts an urgent carbon problem. The carbon in our atmosphere has created a blanket of gas that traps heat and is changing the…
Cisco announced ‘Internet for the Future’ strategy and the industry’s most ambitious silicon architecture. Cisco unveiled further details behind its technology strategy for building a new internet — one designed…
VMware Carbon Black’s semiannual Global Incident Response Threat Report (GIRTR) is out. And it appears attackers continue to evolve. VMware Carbon Black has a vast incident response (IR) partner ecosystem,…
28% of all organizations worldwide were impacted by malicious multi-purpose botnets, while the rise of 20% of incident response cases were targeted ransomware attack. Check Point Research has published its…
The role of the CIO is evolving with more of a focus on revenue and strategy, according to the 2019 Global CIO Survey from Logicalis. The study, which questioned 888…
Tenable has entered into an exclusive partnership with BeyondTrust, a worldwide leader in Privileged Access Management (PAM), that names Tenable as the preferred vulnerability management partner for BeyondTrust Enterprise Vulnerability…
Red Hat accelerates cloud-native development with unified hybrid cloud storage for Red Hat OpenShift Container platform by offering greater security, portability, simplicity, and scale for data-intensive Kubernetes workloads. Red Hat…
Short, simple passwords take fewer resources for hackers to compromise. According to the Verizon Data Breach Investigations Report, 81% of breaches leveraged either stolen and/or weak passwords. That problem is…
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More