IBM has announced a series of new and updated capabilities for developers designed to deliver intelligent application analysis throughout the DevOps pipeline, generally available on March 19. According to an…
Hot Topics
-
-
3 ways the risk of business email compromise is evolving, and how to protect your business
by CIO AXISBy Greg Bangs, SVP, Crime Regional Leader – North America at AXA XL Business email compromise (BEC) is the fastest growing type of social engineering fraud – a broad category…
-
Analysis by Tenable’s Security Response Team (SRT) has revealed 237 breaches in the healthcare sector in the calendar year 2020. The incidents continued into 2021, with 56 breaches already disclosed…
-
The Security Report 2021 carried out by Check Point Research researchers has revealed that a new organization becomes a victim of ransomware every 10 seconds worldwide. The report also reveals…
-
5G, AI, AR, and IoT Among Key Technologies to Play Pivotal Role in Post-Pandemic Landscape
by CIO AXISOver these next few months, the post-pandemic landscape will begin to take shape. like 5G, Artificial Intelligence (AI), Augmented Reality (AR), IoT, and those enabling smart cities and the smart…
-
Nearly half of security pros are prohibited from sharing threat intelligence with professional communities
by CIO AXISOver two-thirds (69%) of threat intelligence (TI) analysts are involved in professional communities, but 48% of all those working in IT and cybersecurity roles are not allowed to share threat…
-
Trend Micro intercepted a surge in malware, phishing and credential theft Trend Micro Incorporated has revealed that it blocked 16.7 million high-risk email threats that slipped past webmail providers’ native…
-
