NortonLifeLock’s global research team, Norton Labs, has published its quarterly Consumer Cyber Safety Pulse Report sharing the top consumer cybersecurity insights and takeaways from January through March 2022, including how…
Hot Topics
-
-
Cybersecurity Skills Gap Contributed to 80 Percent of Breaches According toNew Fortinet Report
by CIO AXISFortinet, a global leader in broad, integrated, and automated cybersecurity solutions, has released its 2022 Cybersecurity Skills Gap Report. The new global report reveals that the cybersecurity skills shortage continues…
-
VMware: 63% of financial institutions admit experiencing an increase in destructive attacks
by CIO AXISVMware has released its fifth annual Modern Bank Heists report, which takes the pulse of the financial industry’s top CISOs and security leaders on the changing behaviour of cybercriminal cartels…
-
Quantum IoT from Check Point protects customers from cyber-attacks by identifying hacked IoT devices
by CIO AXISIoT is everywhere. From smart light bulbs to IP cameras, wearables, and even smart kitchen appliances, IoT provides benefits for any organization as it enables employees to be more productive…
-
Trend Micro Incorporated has announced the launch of Trend Micro One, a unified cybersecurity platform with a growing list of ecosystem technology partners that enables customers to better understand, communicate,…
-
TAC Security Ropes in Cyber Security Industry Veteran Bharat Panchal Into Board of Directors
by CIO AXISTAC Security, a global leader in innovative Risk-Based Vulnerability Management, has announced the appointment of cyber security industry veteran Bharat Panchal into the company’s Board of Directors. As an independent…
-
Motorola Solutions has announced it has acquired Calipsa, Inc., a technology leader in cloud-native advanced video analytics based in London, U.K. Calipsa’s scalable platform enables businesses to optimize security with…
-
ESET researchers have discovered and analyzed three vulnerabilities affecting various Lenovo laptop models. Exploitation of these vulnerabilities would allow attackers to deploy and successfully execute UEFI malware either in the…
