CK Chim named Cybereason Field CSO for Asia Pacific region

CK Chim named Cybereason Field CSO for Asia Pacific region

CK Chim named Cybereason Field CSO for Asia Pacific region | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

The fight against ransomware

The fight against ransomware

The fight against ransomware This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this message or continuing…

Read More

Making the case to leave on-prem for better security

Making the case to leave on-prem for better security

Making the case to leave on-prem for better security This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

5 minutes with Kat Kemper – Using security technology within healthcare to minimize risk, increase efficiency and reduce costs

5 minutes with Kat Kemper – Using security technology within healthcare to minimize risk, increase efficiency and reduce costs

5 minutes with Kat Kemper – Using security technology within healthcare to minimize risk, increase efficiency and reduce costs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our…

Read More

Innovation in the security industry: Searching for the unicorn

Innovation in the security industry: Searching for the unicorn

Innovation in the security industry: Searching for the unicorn | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Three elements of a successful GSOC

Three elements of a successful GSOC

Three elements of a successful GSOC | 2021-08-09 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Associated Grocers of New England’s Risk Management and Loss Prevention teams step up amid pandemic

Associated Grocers of New England’s Risk Management and Loss Prevention teams step up amid pandemic

Associated Grocers of New England’s Risk Management and Loss Prevention teams step up amid pandemic | 2021-08-06 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

DevOps tools proliferation – A whole new world of vulnerabilities

DevOps tools proliferation – A whole new world of vulnerabilities

DevOps tools proliferation – A whole new world of vulnerabilities | 2021-08-05 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Georgetown University’s Office of Emergency Management supports COVID-19 response

Georgetown University’s Office of Emergency Management supports COVID-19 response

Georgetown University’s Office of Emergency Management supports COVID-19 response | 2021-08-04 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

The anatomy of a tabletop exercise

The anatomy of a tabletop exercise

The anatomy of a tabletop exercise | 2021-08-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 23 24 25 26