top of page
Enterprise Security Tech
A cybersecurity resource for CxOs
Search
Nov 1
WhatsApp’s Security Audit Uncovers Key Vulnerabilities in Data Encryption and Privacy Protocols—Meta Responds with Fixes
In a recent report by the NCC Group , WhatsApp’s identity-linked storage (IPLS) was under the microscope, revealing a nuanced picture of...
Oct 30
Maximizing AI Potential: The Critical Role of Data Lakes in Model Training
This contributed article was authored by John Pritchard Ph.D., Chief Product & Technology Officer (CPTO) at Radiant Logic The AI...
Oct 28
Black Basta Ransomware Group Evolves Tactics with Microsoft Teams and QR Code Phishing
Cybersecurity firm ReliaQuest uncovered a disturbing new trend in ransomware attacks involving the notorious Black Basta group. Known...
Oct 28
Apiiro CEO on Overlooked Security Challenges and the Future of AppSec in a GenAI World
In today’s security landscape, a key challenge is the distinction between application security and software supply chain security, often...
Oct 23
Beyond Performance: Why Availability and Durability Must Work Together in Modern HPC
This guest blog was contributed by Ken Claffey, CEO, VDURA For many data managers, performance and ROI are the top metrics, followed...
Oct 22
Stream.Security Secures $30M Series B to Revolutionize Real-Time Cloud Security
Stream.Security , a fast-rising player in real-time cloud security, has raised $30 million in a Series B funding round led by U.S....
bottom of page