top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Ping Identity Launches PingOne Protect to Combat Fraud and Account Takeover Threats
Ping Identity, an identity solutions provider for enterprises, has introduced PingOne Protect, a new service aimed at detecting fraud and...
Jun 2, 2023


How to Protect Against Tsunami DDoS Attacks
The escalating threat of Tsunami-sized web DDoS attacks is a growing concern. This emerging generation of attacks is not only larger in...
May 30, 2023


What the New NIST Guidelines for Handling Sensitive Information Means for Organizations
In a move to enhance the protection of sensitive unclassified information, the National Institute of Standards and Technology (NIST) has...
May 27, 2023


Safeguarding Digital Identity: The Growing Need for Enhanced Security
Identity theft is a pervasive issue that primarily affects consumers, but its potential risks and impact on businesses are often...
May 22, 2023


Why Are Employees Ignoring Cybersecurity Practices?
Cybersecurity best practices are an essential part of most businesses in the modern age, so why are employees ignoring them? The answer...
Apr 21, 2023


WhatsApp Introduces New Security Measure to Protect Against Account Takeover Attacks
WhatsApp, one of the world's most popular messaging apps, has announced a new security measure called "Device Verification" to protect...
Apr 16, 2023
bottom of page