Security News


In the digital age and in the face of the resurgence of cyberattacks, the safeguarding of data becomes an absolute necessity. The scale of attacks spares no business and government, as evidenced...

Polyrize officially launched its cybersecurity platform to help enterprise security teams automate the authorization security process across native and non-native cloud environments. Leveraging a...

Bonitasoft, provider of the leading open-source digital process automation (DPA) platform, announced that the Bonita platform is now available in a new managed Cloud edition that is fully operated...

Disaster recovery capability is a key factor in implementing hybrid and multi-cloud strategy, a new Teradici study reveals. Of the respondents who had implemented a hybrid or multi-cloud strategy,...

A major expectation gap exists between what IT managers hoped the public cloud would deliver for their organizations and what has actually transpired, a Cohesity survey of 900 senior IT decision...

The attackers allegedly stole admin credentials for Office 365 accounts, and planned to use stolen data to conduct gift card fraud.

Security professionals continue to face a number of major challenges as more organizations move legacy IT operations to cloud infrastructure and applications, and traditional security tools often...

For users of Microsoft’s SQL Server and Windows Server 2008, the end is near: Microsoft is actively winding down service for these servers, with support for its SQL Server slated to end entirely...

It might be difficult to fathom how this isn't already mandatory, but Microsoft Corp. says it will soon force all Cloud Solution Providers (CSPs) that help companies manage their Microsoft Azure...