Monthly Archives: November 2024
Why you should deploy modern multi-factor authentication
No right-thinking organization should rely on passwords alone for user authentication. We all know that passwords can be reused, cracke...
Bell expands into US market with $7 billion Ziply Fiber acquisition
News
The deal extends Bell’s fibre reach across North America, targeting millions of new connections
Bell Canada Enterprises, Canada’...
Indosat accelerates monetization efforts and streamlines time-to-market with Ericsson
Press Release
Indosat Ooredoo Hutchison and Ericsson proudly announce the successful deployment of the world’s first full-stack Digital...
Snowflake data theft suspect arrested in Canada
An alleged threat actor behind the data theft and extortion affecting more than 160 customers of the cloud service Snowflake was arrest...
DocuSign’s API used to lure victims into e-signing fake invoices
Cybercriminals are leveraging DocuSign’s Envelopes API to email fake invoices that victims are e-signing and the attackers then use to ...
Cyberthreats linked to foreign actors aim to hinder Election Day proceedings
In the midst of what is expected to be the most closely contested presidential election in recent memory, voting officials are reportin...
Harnessing the Power of Data and AI – Sivan Tehila – FS #1
Sivan Tehila, CEO & Founder of Onyxia Cyber, is a cybersecurity expert and entrepreneur with more than 15 years of experience. Siva...
NTT Data, Palo Alto Networks partner to enhance AI-driven cybersecurity
NTT Data and Palo Alto Network have entered into a new partnership to deliver a Managed Extended Detection Response Service which uses ...
Noma debuts AI security platform
Noma, an Israeli AI security startup, has launched a platform designed to address emerging security challenges in enterprise AI workflo...
Building Cybersecurity Resilience: Strategies, Technologies, and Best Practices from Industry Leaders
In today’s rapidly evolving digital landscape, organizations face unprecedented cybersecurity challenges. The “Guide to Enhancing Cyber...