Toad for Oracle 15.0 provides additional resiliency against vulnerabilities, malware and cyber attacks through comprehensive SSDLC controls and supports Oracle Database 21c.
Read More
											
																			
									Aligning with one of Gartner’s key trends for 2021 - Cybersecurity Mesh, - “a distributed architectural approach to scalable, flexible and reliable cybersecurity control” - Logicalis is shifting the focus from the traditional, risk focussed approach to security to one that empowers the...
Read More
											
																			
									New Cloud Native Detection and Response (CNDR) uses a growing body of behavioural indicators from Aqua’s cyber research team, Nautilus, to detect patterns and respond with granular runtime controls.
Read More
											
																			
									Three-quarters rely on traditional VPNs for remote access while a third also use zero trust as part of their remote access strategy.
Read More
											
																			
									Trend Micro has revealed that global organizations have on average 29 security monitoring solutions...
Read More
											
																			
									AT&T is launching a managed Extended Detection and Response (XDR) offering. The AT&T Managed XDR...
Read More
											
																			
									5G Networks, a licensed telecommunications carrier operating across Australia, has chosen Corero...
Read More
											
																			
									Vendor risk visibility and continuous third-party monitoring remains concerningly low despite...
Read More
											
																			
									Members including Google Cloud, Okta, ServiceNow, Zscaler and others join forces to establish a...
Read More
											
																			
									One in four UK organisations cite the volume of false positives as being one of the biggest...
Read More
											
																			
									CrowdStrike has unveiled a series of new customer offerings and partnerships during the fifth...
Read More
											
																			
									HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host...
Read More
											
																			
									Company’s virtual offerings, cloud services match with on-premises deployments to solve...
Read More
											
																			
									The ISMG Cybersecurity Complexity Study sponsored by ReliaQuest suggests enterprises are adopting ...
Read More
											
																			
									The study on ransomware, conducted by cybersecurity experts at Hornetsecurity, also found that...
Read More