Greater Legal Certainty for Cybersecurity Research
Cybersecurity researchers are frequently unable to comply with data protection statutes as they cannot know in advance w…
Cybersecurity researchers are frequently unable to comply with data protection statutes as they cannot know in advance w…
Securosys SA, a leading provider in cybersecurity, cloud security, encryption, and digital identity protection, is excit…
TÜV SÜD is calling for further advancement of the procedure used for mandatory penetration testing for medical devices a…
“Identity will be the most valuable commodity for citizens in the future, and it will exist primarily online.” - Eric S…
Akamai Technologies, Inc. (NASDAQ: AKAM), the cloud company that powers and protects life online, today announces that i…
The Computer Controls Group has expanded its product portfolio in the "Security" branch by including solutions for encry…
Summary The Trellix Threat Labs Vulnerability Research team has found an unauthenticated remote code execution vulnerab…
Times are uncertain and it is not just the Ukraine war that has made it clear that security leaks in IT structures can j…
The current pandemic situation is still one of the greatest challenges, also for employers. But how can companies fulfil…
NCP, the leading specialist for fully automated, secure data communication, releases version 2.10 of the VS GovNet Conne…