Category: Security

Not if, but when: in the face of increasing cyber risks, businesses must have a strong safety net

Not if, but when: in the face of increasing cyber risks, businesses must have a strong safety net

Mazars, the international audit, tax and advisory firm, has released its cyber security report: is your safety net strong enough? According to research amongst more than 1,000 C-suite executives worldwide, cyber security is now a major preoccupation among corporate leaders. Effective cyber defence has become a delicate balancing act for many businesses; having a strong safety net that can cushion […]

Read more ›
Kaspersky and the GEIGER project: IT security for small and micro enterprises requires training

Kaspersky and the GEIGER project: IT security for small and micro enterprises requires training

Nowadays, digitalisation affects all types of companies, even small ones, and this exposes them to cyber incidents, that can have major consequences in both economic and reputational aspects. Kaspersky has always been sensitive to their security, and thanks to its participation in GEIGER, a project co-funded by the European Commission, it has enhanced its two gamification solutions, which are now […]

Read more ›
Veeam Research Finds Organizations are Increasing Modern Data Protection for Cloud Workloads to Reduce Cyber Security Risks

Veeam Research Finds Organizations are Increasing Modern Data Protection for Cloud Workloads to Reduce Cyber Security Risks

Veeam® Software, the leader in Modern Data Protection, today released the findings of the company’s Cloud Protection Trends Report 2023, covering four key “as a Service” scenarios: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), and Backup and Disaster Recovery as a Service (BaaS/DRaaS). The survey found that companies are recognizing the increasing […]

Read more ›
Breaking the myths of Zero Trust model  and understanding how it can protect your organization

Breaking the myths of Zero Trust model and understanding how it can protect your organization

One of the latest buzzwords in the cyber security industry is a ‘Zero Trust’ security model. In short, a zero-trust model basically means you do not leave any room for errors at all and do not trust anyone or anything.   Owing to a hybrid workplace led by the after-effects of the pandemic and several emerging technologies such as the […]

Read more ›
Veeam Positioned as a Leader in the 2022 Gartner®  Magic Quadrant for Enterprise Backup and Recovery Software Solutions for the Sixth Consecutive Time

Veeam Positioned as a Leader in the 2022 Gartner® Magic Quadrant for Enterprise Backup and Recovery Software Solutions for the Sixth Consecutive Time

Veeam® Software, the leader in backup, recovery and data management solutions that deliver Modern Data Protection, today announced it has been positioned by Gartner, Inc. in the Leaders quadrant of the 2022 Magic Quadrant for Enterprise Backup and Recovery Solutions. Not only does this mark the sixth consecutive time Gartner has recognized Veeam as a Magic Quadrant Leader, but it […]

Read more ›
Qualys Introduces Zero-Touch Patching for Proactive Vulnerability Remediation

Qualys Introduces Zero-Touch Patching for Proactive Vulnerability Remediation

Qualys, a pioneer and leading provider of disruptive cloud-based IT, security and compliance solutions, today announced it is integrating zero-touch patching capabilities into Qualys Patch Management. Zero-Touch Patch ensures that companies’ endpoints and servers are proactively updated as soon as patches are available, reducing their overall attack surface. Most vulnerability remediation involves multiple teams and processes – first, a scanning […]

Read more ›
New palmvein scanner from iCOGNIZE

New palmvein scanner from iCOGNIZE

The Hessian company iCOGNIZE is launching the ScanVein Compact (SVC) this month – a new palm vein scanner for biometric authentication. It can be used to effectively secure any access areas in companies. Access control of the future With the ScanVein Compact, iCOGNIZE is ushering in a new era in product development: The new 2CON transmission technology has already been […]

Read more ›
Primele 5 scheme de atac ale criminalilor cibernetici se desfășoară în timpul JO

Primele 5 scheme de atac ale criminalilor cibernetici se desfășoară în timpul JO

De data aceasta, toate evenimentele vor avea loc fără spectatori, ceea ce reduce riscurile fizice – din punct de vedere al sănătății și al securității cibernetice (cum ar fi furtul de date folosind vulnerabilitățile Wi-Fi-ului public de pe stadion). Cu toate acestea, pasionații de sport nu ar trebui să uite că infractorii cibernetici vor profita de dorința fanilor de a […]

Read more ›
4 Ways to Build Cybersecurity Resilience

4 Ways to Build Cybersecurity Resilience

From third-party supply chain attacks to exploits targeting Microsoft Exchange to worries about our election security and infrastructure, the world faces unprecedented and unrelenting cybersecurity challenges. U.S. Secretary of Homeland Security Alejandro N. Mayorkas, Girl Scouts’ Interim CEO Judith Batty, and Dr. Chutima Boonthum-Denecke from Hampton University’s Computer Science Department discussed those issues at a special event hosted by RSA […]

Read more ›
Veeam Enables Organizations to Accelerate their Data Protection Strategies During VeeamON 2021

Veeam Enables Organizations to Accelerate their Data Protection Strategies During VeeamON 2021

Veeam® Software, the leader in backup solutions that deliver Modern Data Protection, today kicked off its seventh annual user event, VeeamON 2021, delivering a clear overview of its vision and strategy for the most advanced data protection solutions for cloud, virtual, SaaS, Kubernetes and physical workloads. VeeamON 2021 looks back at how Veeam and their ecosystem of partners have endured […]

Read more ›
Cryptoscam in Discord

Cryptoscam in Discord

Discord was originally created for gamers, but thanks to its handy system of “servers” (communities), channels, and private messages, it’s brought in all kinds of people, from study groups to common-interest clubs — including fans of cryptocurrency. On their servers, traders discuss the latest on altcoins, investors share predictions, and scammers ponder how to cash in on both. We unpack […]

Read more ›
Cybersecurity for Patient Safety

Cybersecurity for Patient Safety

Patient safety is a key topic in healthcare. Companies utilize safeguards in a variety of ways to ensure patient safety. Some of these safety practices include safeguards for patients receiving the correct treatments and medications, procedures to ensure patients are safe in their environment, and processes for providers to follow for properly communicating patient information. Most people might not consider […]

Read more ›