84 Results for:hacker

Automated Penetration Testing Platform

sponsored by Pcysys Published: 03 May 2021 Data Sheet

Traditionally, manual penetration testing is a costly and unreliable endeavor. However, modern automated penetration testing platforms enable organizations to better understand their unique vulnerabilities, ...

View Now

Computer Weekly – 29 March 2022: Ten years of the Raspberry Pi

sponsored by TechTarget ComputerWeekly.com Published: 29 Mar 2022 Ezine

In this week's Computer Weekly, as the Raspberry Pi reaches its 10th anniversary, we look back on how the low-cost computing device went from schools to supercomputers and even into space. Gartner offers tips on ...

View Now

SNOCC Quarterly Threat Update

sponsored by Nexum Published: 03 Jun 2023 Blog

Cybercriminals are constantly fighting to stay a move ahead, and as a result are constantly exploring new methods This blog article serves as an updated installment of Nexus’s quarterly threat updates, in which ...

View Now

RANSOMWARE THREAT REPORT 2022

sponsored by Palo Alto Networks Published: 30 Sep 2022 Analyst Report

Between DoS attacks, ransomware as a service (RaaS), and double-extortion, hackers are becoming more resourceful with their ransomware campaigns. This report looks at the state of ransomware, analyzing how the ...

View Now

Cloud Security & Compliance For Dummies

sponsored by Palo Alto Networks Published: 17 Oct 2023 eBook

The traditional security perimeter has disappeared, leading to acceleration and innovation in the technologies and methods developed by both hackers and security professionals. Download this Cloud Security & ...

View Now

Securing Internet infrastructure in the age of zero-day exploits

sponsored by Superloop Published: 05 Dec 2023 Blog

Why should you work to minimize your organization’s internet infrastructure footprint? Because hackers often search the internet for vulnerable devices to exploit. Along with delving into that issue, this blog maps...

View Now

u.trust Anchor – Highest Security Inspired by Cloud Technology

sponsored by Utimaco Published: 25 Oct 2023 Product Overview

In the wake of digital transformation, hackers have taken advantage of the expanding attack surface to deliver an unprecedented scale of attacks. Utimaco’s next generation HSM, u.trust Anchor, is designed to ...

View Now

Let’s Play a Game (of Deception)

sponsored by Nexum Published: 02 Jun 2023 Blog

What if security professionals didn’t just defend, but fought back? This blog article explores the evolving practice of deception technology, a class of cybersecurity that utilizes decoys to misdirect and lure ...

View Now

Crytica Puts the “D” In MDR EDR AND XDR

sponsored by Crytica Security, Inc. Published: 12 Dec 2023 Product Overview

Research shows that the average time it takes for an organization to detect a cyber infiltration is 180 days. Crytica brings to the cybersecurity arsenal a new and powerful detection technology that can help reduce...

View Now