Among the most common risks that enterprises face are email fraud attacks, often referred to as Business Email Compromise.On Feb. 14, Symantec announced its...
Over the last few years, cybercriminals have been forced to evolve their tactics in response to the emergence of advanced protection techniques that have...
Attivo Networks announced on Feb. 12 that it is expanding its ThreatDefend cyber-security deception platform with its new "The Informer" forensic collection technology.Deception is...
Qualys announced a new patch management application on Feb. 12, providing organizations with the ability to more easily manage the often complex process of...
A new serious vulnerability in container technology was publicly reported on Feb. 11, one that could potentially enable an attacker to gain unauthorized access...
The Istio service mesh project is an up-and-coming open-source effort that already has the backing of major IT vendors that include IBM, Cisco, Google...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...