84 Results for:hacker
Automated Penetration Testing Platform
sponsored by Pcysys Published: 03 May 2021 Data SheetTraditionally, manual penetration testing is a costly and unreliable endeavor. However, modern automated penetration testing platforms enable organizations to better understand their unique vulnerabilities, ...
View NowComputer Weekly – 29 March 2022: Ten years of the Raspberry Pi
sponsored by TechTarget ComputerWeekly.com Published: 29 Mar 2022 EzineIn this week's Computer Weekly, as the Raspberry Pi reaches its 10th anniversary, we look back on how the low-cost computing device went from schools to supercomputers and even into space. Gartner offers tips on ...
View NowSNOCC Quarterly Threat Update
sponsored by Nexum Published: 03 Jun 2023 BlogCybercriminals are constantly fighting to stay a move ahead, and as a result are constantly exploring new methods This blog article serves as an updated installment of Nexus’s quarterly threat updates, in which ...
View NowRANSOMWARE THREAT REPORT 2022
sponsored by Palo Alto Networks Published: 30 Sep 2022 Analyst ReportBetween DoS attacks, ransomware as a service (RaaS), and double-extortion, hackers are becoming more resourceful with their ransomware campaigns. This report looks at the state of ransomware, analyzing how the ...
View NowCloud Security & Compliance For Dummies
sponsored by Palo Alto Networks Published: 17 Oct 2023 eBookThe traditional security perimeter has disappeared, leading to acceleration and innovation in the technologies and methods developed by both hackers and security professionals. Download this Cloud Security & ...
View NowBugcrowd CTO Talks Hacker Feedback, Vulnerability Disclosure
sponsored by TechTarget Published: 07 Jun 2023 eGuideph
View NowSecuring Internet infrastructure in the age of zero-day exploits
sponsored by Superloop Published: 05 Dec 2023 BlogWhy should you work to minimize your organization’s internet infrastructure footprint? Because hackers often search the internet for vulnerable devices to exploit. Along with delving into that issue, this blog maps...
View Nowu.trust Anchor – Highest Security Inspired by Cloud Technology
sponsored by Utimaco Published: 25 Oct 2023 Product OverviewIn the wake of digital transformation, hackers have taken advantage of the expanding attack surface to deliver an unprecedented scale of attacks. Utimaco’s next generation HSM, u.trust Anchor, is designed to ...
View NowLet’s Play a Game (of Deception)
sponsored by Nexum Published: 02 Jun 2023 BlogWhat if security professionals didn’t just defend, but fought back? This blog article explores the evolving practice of deception technology, a class of cybersecurity that utilizes decoys to misdirect and lure ...
View NowCrytica Puts the “D” In MDR EDR AND XDR
sponsored by Crytica Security, Inc. Published: 12 Dec 2023 Product OverviewResearch shows that the average time it takes for an organization to detect a cyber infiltration is 180 days. Crytica brings to the cybersecurity arsenal a new and powerful detection technology that can help reduce...
View Now