Latest
Keepit Secures USD 50M in its Latest Funding Round
Arctic Wolf Acquires Cylance of BlackBerry for USD 160M
Sublime Security Nabs USD 60 M for its Platform and Community
Ayar Labs Raises $155M to Transform AI Workloads with Light
Citrix Acquires Strong Network and DeviceTRUST for Zero-trust Security
Vaultree Open-sourced its Data Encryption Technology Elements
AWS is Widening its Cybersecurity Portfolio to Combat Breaching
N-able Acquires Adlumin to Expand Cybersecurity Portfolio
Halcyon Secures USD 100 M to Combat Ransomware
Wiz Acquires Dazz, a Cybersecurity Startup for a Whopping USD 450 M
Login
Login
Insights
cloud
solutions
virtualization
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
News
cloud
solutions
virtualization
digital
digital marketing
social media marketing
Finance
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
Whitepapers
All
Security
2024 state of application strategy report...
datos – api security solution evaluation guide...
challenges in application security (and why your o...
ai pcs are quickly becoming the key to achieving s...
5 strategies to defend against the growing risk of...
5 strategies to defend against the growing risk of...
5 strategies to defend against the growing risk of...
5 strategies to defend against the growing risk of...
5 strategies to defend against the growing risk of...
the vancouver canucks score a cybersecurity hat tr...
cyber insurance and cyber defenses 2024: lessons f...
how to run a cybersecurity tabletop exercise...
unpatched vulnerabilities: the most brutal ransomw...
du rôle du stockage pour relever les défis de la...
il ruolo dello storage per garantire la resilienza...
state of the european security and privacy markets...
ランサムウェア対策の 7 つのベスト�...
cyber snapshot, issue 7 - five hot topics in cyber...
veeam's ai security: zero trust demos...
api 보안 ebook...
All
Security
application protection management in a digital era...
continuous data protection strengthening business ...
cloud encryption fortifies digital frontier for en...
grid computing harness distributed resources for s...
enhancing cyber resilience: a strategic approach t...
advanced encryption standard: pillar for modern da...
secure sensitive data with privileged access manag...
modernizing secops in enterprises: a comprehensive...
explore 5 tactics to enhance innovation at the edg...
advanced api security: why gateways alone aren't e...
intrusion detection system: the cornerstone of net...
single-vendor sase: key use cases to consider befo...
why are targeted ransomware attacks so successful?...
why threat hunting cyber security is today’s nee...
dynamic application security testing for technical...
critical role of virtual firewall in optimizing en...
secure voice communications: safeguarding your con...
role-based access control: inherent necessity of e...
best sase solution to protect your remote workforc...
uncover ai-powered cyberattacks for advanced threa...
All
Security
keepit secures usd 50m in its latest funding round...
arctic wolf acquires cylance of blackberry for usd...
sublime security nabs usd 60 m for its platform an...
ayar labs raises $155m to transform ai workloads w...
citrix acquires strong network and devicetrust for...
vaultree open-sourced its data encryption technolo...
aws is widening its cybersecurity portfolio to com...
n-able acquires adlumin to expand cybersecurity po...
halcyon secures usd 100 m to combat ransomware...
wiz acquires dazz, a cybersecurity startup for a w...
hp launches enterprise security edition to boost b...
bitsight acquires cybersixgill in a usd 115 m deal...
zscaler launches zero trust segmentation to boost ...
fortinet launches fortiai integrations to expand a...
permiso releases a suite of three open-source tool...
fortanix and versasec partner to strengthen crypto...
crowdstrike to acquire adaptive shield, a cloud se...
ransomware gang breaches schneider electric and de...
google uncovers susceptibility using ai to be worl...
armis raises usd 200 m round at usd 4.2b valuation...
All
Security
startup zero networks secures usd 20m...
new searchlight security module brings extra intel...
data privacy best practices every business should ...
Home
Sponsored By
ibm
Whitepapers
e-book: 5 questions to ask before you upgrade to a modern siem solution
Sponsored by:
IBM
Published By:
Research Desk
Released:
May 06, 2020
IT security teams have to protect their organizations from cyber attackers while also addressing internal and regulatory compliance requirements, such as ISO 27001, PCI DSS or GDPR. This is no small t...
Read more
forbes: perception gap in cyber resilience: where are your blind spots?
Sponsored by:
IBM
Published By:
Research Desk
Released:
Jan 09, 2020
This report is based on a Forbes Insights and IBM survey of 353 executives across the globe, which reveals a significant disconnect between how executives view resilience and responsibility when it co...
Read more
magic quadrant for security information and event management
Sponsored by:
IBM
Published By:
Research Desk
Released:
Nov 06, 2019
Gartner defines the security and information event management (SIEM) market by the customer’s need to analyze event data in real time for early detection of targeted attacks and data breaches, and t...
Read more
ciso buyers guide to ai: beyond the hype
Sponsored by:
IBM
Published By:
Research Desk
Released:
Oct 22, 2019
AI in your SOC - go beyond the hype. Ask yourself these 7 questions before adopting a cybersecurity cognitive solution....
Read more
top 5 myths about siem e-book
Sponsored by:
IBM
Published By:
Research Desk
Released:
Oct 22, 2019
It’s no secret the cybersecurity industry is facing a major skills shortage. Security solutions — SIEM or otherwise — must be designed to enable you to be effective at your job, despite your (li...
Read more
sc magazine analysis brief: marrying siem and ai
Sponsored by:
IBM
Published By:
Research Desk
Released:
Oct 22, 2019
Survey Says: AI is the future of SIEM - more than 50% of enterprises planning to use AI with SIEM by the end of 2018. When configured and managed properly, there is nothing like a SIEM platform to bri...
Read more
artificial intelligence and cybersecurity for dummies, ibm limited edition
Sponsored by:
IBM
Published By:
Research Desk
Released:
Oct 22, 2019
Both AI and cybersecurity are broad and poorly understood fields. This book helps give you an overview of the various technologies that make up AI, where they have come from, and what AI has evolved...
Read more
ibm resiliency orchestration with cyber incident recovery
Sponsored by:
IBM
Published By:
Research Desk
Released:
Oct 16, 2019
A business disruption due to a cyberattack can be damaging to an organization’s financial wellbeing and reputation. Traditional DR solutions are not designed to recover IT from cyber disruptions. As...
Read more
four keys to effectively monitor and control secure file transfer
Sponsored by:
IBM
Published By:
Research Desk
Released:
Oct 14, 2019
Is your file transfer infrastructure equipped to meet today’s business demands? Read four keys you can apply to dramatically improve the security, auditability, service delivery, and scalability ...
Read more
ibm resilient soar platform and ibm qradar security intelligence solution brief
Sponsored by:
IBM
Published By:
Research Desk
Released:
Oct 12, 2019
Align SIEM and SOAR to accelerate response times and reduce analyst workload.By integrating the IBM Resilient SOAR Platform with IBM QRadar® Security Intelligence, security teams can build out a mark...
Read more
Posts navigation
Prev
1
2
3
4
5
6
Next
Whitepapers
News
Insights
Security
Security
Security
We use cookies to ensure we give you the best experience on our website. We strongly encourage you to read our updated
Privacy Policy
Agree