Barracuda announces threat predictions for 2022 Express Computer Dec 23, 2021 Barracuda Networks has revealed predictions that will shape the future of cybersecurity and tech space in the coming year
Indian enterprises need a comprehensive plan for DDoS mitigation Express Computer Dec 23, 2021 Today we are witnessing the rapid expansion of the cyber-threat landscape, prompting organisations to put in place robust…
Citrix deploys desktops to cloud solutions Express Computer Dec 21, 2021 Hybrid working models have led to more and more organizations deploying virtual desktops. Workforce distribution has resulted in…
Tenable introduces Tenable.cs to provide security from code to cloud Express Computer Dec 13, 2021 Tenable, Inc., the cyber exposure company, has announced the release of Tenable.cs, adding new cloud-native security capabilities…
Trend Micro security prediction report forecasts cyber fightback in 2022 Express Computer Dec 8, 2021 Trend Micro Incorporated predicted global organizations will emerge more alert and better prepared in 2022 thanks to a…
True Runtime Protection of Applications: The Next Cybersecurity Frontier Express Computer Nov 17, 2021 Puneet Gupta, Executive Director and Country Head – India, Virsec, explains why network-based security is obsolete and…
Palo Alto Networks unveils security innovations at Ignite ’21 Express Computer Nov 17, 2021 Palo Alto Networks showcased security innovations to help organizations protect a rapidly expanding attack surface. Before an…
Instasafe partners with HPE to address the security needs of customers Express Computer Nov 16, 2021 Instasafe, announces that it has been named as a Server Tested Silver Partner in Hewlett Packard Enterprise’s (HPE) Partner Ready…
Learn how to put Zero Trust into action Srikanth RP Nov 12, 2021 The world has changed considerably since the pandemic. Digital initiatives have accelerated. With the rise in digital initiatives,…
Why Ethical Hacking is the need of the hour Express Computer Nov 1, 2021 Ethical hacking is a legal method of gaining unauthorized access to a computer system, application, or data. Security specialists…