NEWS AND FEATURES

Chinese Hacking Group “RedEcho” Targets Indian Power Sector

Relations between India and China have worsened after troops from both sides engaged in a skirmish in May 2020. While diplomacy factors have thwarted...

INTERVIEWS

WHITEPAPER

why security programs fail

Here’s Why Security Programs Often Fail

Helen Keller, a famous American author once said, “Security is a superstition. It does not exist in nature.” This quote references the security of...
SOC 2 Examinations, ByteChek

Use SOC 2 Examinations to Keep Your Security Program in “Chek”

Protecting customers' data is a concern for all organizations regardless of industry or size. Most organizations outsource key aspects of their business to third-party...

PODCASTS

MARKET TRENDS REPORT

With organizations going remote in the year 2020 thousands of desktops, workstations, laptops, mobile phones, tablets, access points, printers, IP-cams, USB devices, cloud VMs, and virtual desktops, which previously acted as personal devices and machines, suddenly became Endpoints of...

HOTSPOTS

Sertainty self protecting data platform

Defend Your Data with a Sense of Sertainty

Sertainty Self-Protecting-Data is an advanced technology that provides data the awareness to act and react, enabling security directly at the data layer. Have a look...

INNOVATOR’S CORNER

AjnaLens

AjnaLens – Making Augmented Reality a Reality

In the last three decades, we have seen how innovation in computer technology has transformed human life at a rate which no other invention...

Wi-Jungle: Keeping Intrusions Away From Your Network Jungle

Six months ago, while we toasted the turn of the decade, no one imagined the world would come to a grinding halt because of...

INFOGRAPHICS

GOVERNANCE

PRIVACY

European Commission Initiates Process to Allow Personal Data Flow to U.K.

The U.K. withdrew from the European Union on January 31, 2020. The transition period of the withdrawal lasted until December 31, 2020, and thus...

STARTUPS

Authomize Raises $6Mn to Come out of Stealth Mode

Tel Aviv has been a launchpad for many cybersecurity startups in recent years. Continuing this trend, Authomize, an Identity and Access Management (IAM) solutions...

THREATS

Latest Issue is Out

Cyber Security Magazine - Women's Day Special

SUBSCRIBE NOW

Listen to the latest episode

White Paper

FOLLOW US FOR MORE UPDATES












WORKFORCE