Abacus Group Expands UK Presence with Edinburgh Office Opening
ETSI Protection Profile for securing smartphones gains world-first (...)
Global Immersion Cooling Market 2023-2027
Expert Comment: CISA Urges Patching of Exploited SharePoint Vuln (...)
Operation Find Them All: Cellebrite Unites Philanthropic Pioneers to (...)


A conversation with Professor Avishai Wool, CTO and Co-founder of AlgoSec, and Tsippi Dach, Director of Brand and Marketing (...)
Next...Ward Van Laer, Senior Systems Engineer, Belgium, Netherlands and Luxembourg from NETSCOUT met at Luxembourg Security Summit, (...)
Next...Successful cyberattacks can cause significant financial losses and harm to businesses. According to the recent findings by (...)
Next...


Opinion
Thursday 11 January2023 will go down as a transitional year for cybersecurity and information technology in general. Quantum Computing is still in its infancy, and (...)
Next...
Malware Update
Wednesday 10 JanuaryCheck Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd. has published its Brand Phishing Report for Q4 (...)
Next...
Opinion
Thursday 21 DecemberWhether you work in a small/medium-sized business (SMB) or a large enterprise, technology company, finance organisation, or anything in between, (...)
Next...
Opinion
Wednesday 20 DecemberStrategic planning is a big part of creating a sustainable path to success for a business. However, building strategies around the growth of (...)
Next...
Opinion
Thursday 14 DecemberIn recent years, we have witnessed a rapid rise in the use of generative artificial intelligence (AI) in various industries. From creating art to (...)
Next...
Opinion
Monday 11 DecemberAs the demand for heightened security and seamless user experiences continues to grow across various sectors, advanced biometric technologies are (...)
Next...

Identity & Access Governance is a must for every business. Unfortunately, the way it is commonly done today is inefficient and cumbersome. It is latest time to review the approaches on Identity & Access Governance and implement lean (...)
Next...
Small and Mid-sized Businesses (SMBs) athenticate their end-users primarily with passwords, in spite of the fact that passwords are less secure, inconvenient, and in fact more expensive than stronger forms of authentication. Compared to larger (...)
Next...
See all articles
Your podcast HereNew, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr
All new podcasts