Salesforce, the global leader in CRM, has released its State of Data and Analytics report with key trends from over …
HID to showcase future-proof solutions at GITEX 2023
HID recently announced it will showcase its latest innovations in secure identity issuance and identity management at GITEX Global 2023 under the theme, “Secure, Sustainable, Future-proof Solutions”.
Cisco develops new innovation towards AI-first security cloud
Cisco is delivering on its promise of the AI-driven Cisco Security Cloud by investing in cutting-edge artificial intel that will …
Dell Technologies partners with NVIDIA on generative AI project
Dell Technologies, and NVIDIA have announced a joint initiative to make it easier for businesses to build and use generative …
Bulwark partners with Continuity to secure enterprise storage & backup systems
Continuity, a leading provider of cyber resilience solutions today announced its partnership with Bulwark Distribution FZCO. Together, the two companies are dedicated to securing organisations’ storage and backup systems, to withstand ransomware and other cyberattacks.
The Borderless Enterprise: How do You Keep it Stable and Secure?
(Infoblox): The Borderless Enterprise: How do You Keep it Stable and Secure?
Orange Business Services and Fortinet partner on SASE to create a secure cloud-native network
Orange Business Services and Fortinet partner on SASE to create a secure, seamless and scalable cloud-native network, delivering improved user experience.
Zoom gets security boost with Keybase acquisition
Zoom Video Communications have announced that it has acquired Keybase, a secure messaging and file-sharing service.
Juniper Networks expands SDN offerings with new partnerships
Juniper Networks has announced technology alliance partnerships with a number security providers across a variety of critical areas, including endpoint security, cloud access security and network access control.
SIM cards vulnerable to hacking, says researcher
Millions of mobile phones may be vulnerable to spying due to the use of outdated, 1970s-era cryptography, according to new research due to be presented at the Black Hat security conference.