Over two-thirds (69%) of threat intelligence (TI) analysts are involved in professional communities, but 48% of all those working in IT and cybersecurity roles are not allowed to share threat…
Hot Topics
-
-
Trend Micro intercepted a surge in malware, phishing and credential theft Trend Micro Incorporated has revealed that it blocked 16.7 million high-risk email threats that slipped past webmail providers’ native…
-
-
Research from cybersecurity vendor ESET reveals that 80% of businesses worldwide are confident their home-working employees have the knowledge and technology to mitigate cybersecurity risks. This could possibly be due…
-
CrowdStrike has announced enhancements to the CrowdStrike Falcon platform that significantly improve Security Operations Center (SOC) efficiency and effectiveness, allowing security teams to focus on critical priorities and fortify their…
-
In an effort to promote AI led innovation in India, the National Association of Software and Services Companies (NASSCOM) along with Microsoft has launched the ‘AI Gamechangers’ program. As part…
-
By Shibu Paul, Vice President – International Sales at Array Networks. Vulnerability is a costly affair for organizations. Every data stored within the organizations carries its own value, but without…
-
