Private mobile networks will fuel the 4th industrial revolution

Private mobile networks will fuel the 4th industrial revolution

Private mobile networks will fuel the 4th industrial revolution | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Transforming data security teams from gatekeepers to enablers

Transforming data security teams from gatekeepers to enablers

Transforming data security teams from gatekeepers to enablers | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

New Proofpoint CEO Ashan Willy Pushes Information Protection

New Proofpoint CEO Ashan Willy Pushes Information Protection

New Proofpoint CEO Ashan Willy plans to expand the company’s information protection capabilities and grow Proofpoint’s threat protection business outside North America. The Sunnyvale, Calif.-based email security vendor named Willy interim CEO March 2 and elevated him to the permanent CEO role Monday, making him the second top executive in Proofpoint’s 20-year history. Willy, 50, started at Proofpoint in December 2016 and replaces Gary Steele as CEO. Steele, 59, founded Proofpoint in November 2002 and…

Read More

Cloud growth brings security concerns for e-commerce

Cloud growth brings security concerns for e-commerce

Cloud growth brings security concerns for e-commerce | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

One-fifth of cybersecurity alerts are false positives

One-fifth of cybersecurity alerts are false positives

One-fifth of cybersecurity alerts are false positives | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

What the IRS got wrong about biometrics

What the IRS got wrong about biometrics

What the IRS got wrong about biometrics | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Viewpoint on edge security: What to know about SASE

Viewpoint on edge security: What to know about SASE

Viewpoint on edge security: What to know about SASE | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Security shortfalls ranked top roadblock to IT modernization

Security shortfalls ranked top roadblock to IT modernization

Security shortfalls ranked top roadblock to IT modernization | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Cybersecurity solutions roundup 2021

Cybersecurity solutions roundup 2021

Cybersecurity solutions roundup 2021 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

The business case for data-centric security

The business case for data-centric security

The business case for data-centric security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 8 9 10 11 12 15