vulnerabilities - search results

If you're not happy with the results, please do another search
Cisco building, Cisco logo

Cisco fixes 12 vulnerabilities in Data Center Network Manager

Of the 12 vulnerabilities patched by Cisco, the most severe include a trio of critical authentication bypass flaws, two of which reside in DCNM API endpoints
Ensuring Brand Protection Against Cyber Attacks

Ensuring brand protection against cyber attacks

Companies across all industries and sizes must make sure that they are protected and safeguarded against all forms of cyberattacks today
Ransomware is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. (Photo: Agency)

Expert Explained: What is ransomware?

Ransomware is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
The data sought by cybercriminals vary from one vertical to another, whether banking credentials, medical records, pricing information or confidential research, to name just a few.

Top 3 business verticals most targeted by bad bots

The data sought by cybercriminals vary from one vertical to another, whether banking credentials, medical records, pricing information or confidential research, to name just a few
Employees working from home need to keep their devices safe, confidential information private and networks secure to ensure business data security amid covid-19 lockdown

How to keep business data safe while working from home

Employees working from home need to keep their devices safe, confidential information private and networks secure to ensure business data security amid covid-19 lockdown
Moving physical data center to cloud: Here're key non-negotiables for cloud migration

Moving physical data center to cloud: Here’re key non-negotiables for cloud migration

Any journey from a physical data center to the cloud requires careful thought, education and investment in new capabilities to enable migration to the new environment.
Data Protection | Password Managers 2020

Secure your information & data with password managers

There is a lot of personal or business information online. Secure their vulnerability using password managers, and conduct your business in safety
Karl-Henrik Sundström

Former NXP CFO Karl-Henrik Sundström joins Tracklib’s board as chairman

Tracklib said that it has appointed former NXP Semiconductors chief financial officer (CFO) Karl-Henrik Sundström to its board as chairman
UNISOC EVP Eric Zhou

Telecom Trends 2020: 5G, AI, IoT and cybersecurity to dominate telcos space

5G will increase network coverage, address connectivity issues and enable edge computing, AI, and machine learning
Rajesh Maurya, Regional Vice President, India & SAARC at Fortinet

Need to bolster banking apps security on mobile devices: Fortinet’s Rajesh Maurya

Exploits targeting banking apps on mobile devices, are a significant part of the growing threat trend that must be addressed, says Rajesh Maurya, Regional Vice President, India & SAARC at Fortinet
- Advertisement -SAP Hana