Home Search
microsoft - search results
If you're not happy with the results, please do another search
Challenges and Applications of Digital Forensics
Crimes committed within the electronic or digital domains, particularly within cyberspace, have become general. They use technology as a footprint, commit offenses, and create...
Everything You Need to Know About the Evolution of Cyberthreats
The theory of evolution proposed by Charles Darwin is based on the concept of change in characteristics of a population over successive generations. An...
Identity as the New Perimeter
In this day and age, your identity is a shared asset. Be it a calling card, passport or license -- it’s the means by...
“We are committed to turning companies with ideas into global industry leaders”
Israel has a booming startup ecosystem with investors, startups, research centers, and multi-national big tech companies (IBM, Intel, Microsoft, Google etc.), and with the...
“I expect security options to evolve over time with the rollout of 5G”
The potential threat posed by cyberterrorism has crippled both government and security experts. Whether it is cable news, newspapers, websites or social media, “cyberthreat”...
CISA Unveils Joint Cyber Defense Collaborative to Boost Cybersecurity
The increase in the number of cybercriminal groups and ransomware cartels makes it difficult for organizations to stop the threat single-handedly. Cyber collaborations from...
After Power Sector, Chinese Threat Actors Prey on Telcos in Southeast Asia
Threat actors often target high-profile organizations in critical sectors to spread their attack vector to a larger extent. From power plants to food processing...
Federal Agencies Score Poor in Securing Sensitive Data: Senate Report
Companies lose trust when they fail to protect user data or implement necessary security advancements. Organizations bear the blame whenever attackers exploit unpatched vulnerabilities...
CISA Provides Details on Top Routinely Exploited Vulnerabilities in 2020 and 2021
Organizations can boost their overall cybersecurity posture by regularly updating their network systems and patch vulnerabilities. Understanding how attackers leverage malicious techniques and the...
Risk-based Vulnerability Management – Overdue for Automation
The digital world is a blink-and-you’ll-miss-it environment, and organizations need to move aggressively to shrink the exploitable vulnerability window. Adversaries are breaching the security...