Amazon executives responsible for the company’s planned move to create a headquarters on the East Coast appear to be rethinking their decision when it...
LAS VEGAS—When Check Point Software began its work in the IT security industry in 1993, smartphones, mobile tablets, IoT, and cloud applications and services...
As attackers become increasingly sophisticated, there is a need for advanced technologies that can detect attacks that traditional tools can't.That's the mission for Blue...
More than a week after the first reports of a critical vulnerability in Apple's FaceTime messaging application surfaced, an official patch is now available. As it...
Today’s topics include a Harris Poll by Google finding that password reuse remains a barrier to safe internet use, and Google advancing confidential computing...
Idaptive announced its Next-Gen Access Cloud on Feb. 7, providing organizations with a unified approach for Identity and Access Management (IAM) in the cloud...
Cyber-security startup Netography emerged from stealth on Feb. 7 with a new technology approach to help organizations defend against the risk of distributed denial-of-service...
Google is working to advance the next stage of cloud cyber-security with an approach known as confidential computing and the open-source Asylo, project which...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...