eCommerceNews UK - Technology news for digital commerce decision-makers

MAPP stories - Page 13

Gettyimages 1020698160

Schneider Electric and Claroty launch building security solution

Tue, 14th Jun 2022
#
datacentre infrastructure
#
power / energy
#
cybersecurity
Schneider Electric has announced the launch of Cybersecurity Solutions for Buildings, a solution designed to help buildings customers secure BMS.
Gettyimages 1065824694  5

Visibility and control gaps undermining security - report

Thu, 9th Jun 2022
#
risk & compliance
#
cybersecurity
#
trend micro
Organisations are struggling to define and secure an expanding cyber-attack surface, hampering risk management efforts.
Gettyimages 1065824694

Mandiant launches digital risk protection offering

Wed, 8th Jun 2022
#
data protection
#
advanced persistent threat protection
#
supply chain
Mandiant has launched a digital risk protection offering that allows security leaders to proactively mitigate threats before they disrupt business operations.
Gettyimages 1350595566  1

Infosec unveils role-guided cybersecurity training roadmaps

Wed, 25th May 2022
#
edutech
#
cybersecurity
#
education, learning & training
Infosec Skills Roles maps hands-on training and certifications to the 12 most in-demand cybersecurity roles to maximise training efficiency.
Gettyimages 1321662865

The path to an adaptive, modern network

Mon, 23rd May 2022
#
malware
#
network infrastructure
#
zero trust security
Aruba has announced advancements to its ESP, including new functionality in Aruba Central, to help businesses adapt to rapidly changing requirements.
Gettyimages 894954832

HackerOne launches Attack Resistance Management solution

Thu, 12th May 2022
#
cybersecurity
#
cloud services
#
cyber attacks
HackerOne has launched Attack Resistance Management - a new category of security solution that targets the root causes of the attack resistance gap.
Pic   brad rosairo

How free migration tools compare with paid solutions

Fri, 8th Apr 2022
#
data analytics
#
public cloud
#
martech
Migrating to the cloud? This article explores the advantages and drawbacks of free migration tools from Microsoft and Google compared to third-party solutions.
Gettyimages 465425870

Qualys steps into future of EDR with latest release

Wed, 6th Apr 2022
#
advanced persistent threat protection
#
risk & compliance
#
edr
Qualys has launched Multi-Vector EDR 2.0 with additional threat-hunting and risk mitigation capabilities, designed to improve alert prioritisation.
Gettyimages 896157870

Digital decarbonisation of the mining industry - now or never

Tue, 22nd Mar 2022
#
cloud services
#
opinion
#
solar power
With the rise of conscious consumerism and conscious capitalism, mining enterprises are facing pressure to shift to cleaner and more sustainable operations.
Gettyimages 1312360334

Virsec launches Deterministic Protection Platform to protect software workloads

Fri, 28th Jan 2022
#
datacentre infrastructure
#
supply chain
#
healthtech
Virsec launches Deterministic Protection Platform to provide better protection against known and unknown threats to software workloads.
Gettyimages 1279887071

CyberRes launches Galaxy, brings cyber threat intelligence to security execs

Thu, 13th Jan 2022
#
data analytics
#
martech
#
planning
Micro Focus' CyberRes has launched Galaxy, an immersive cyber threat experience to provide actionable intelligence for security executives.
Gettyimages 1199694568

How organisations can apply business process improvement to achieve more strategic business outcomes

Wed, 15th Dec 2021
#
partner programmes
#
printing
#
maps
UK organisations faced challenges during the pandemic to adapt their working practices. Here are five steps to future-proof business processes.
Gettyimages 1313783716

Zero Trust, blockchain, 6GHZ superhighway amongst next year's top tech predictions

Wed, 15th Dec 2021
#
malware
#
uc
#
blockchain
Extreme Networks leadership team predicts proactive efforts around Zero Trust initiatives in 2022, along with the rise of blockchain, Wi-Fi dominance, and more.
Gettyimages 1283639096

How to modernise IT with minimal disruption

Thu, 9th Dec 2021
#
digital transformation
#
application security
#
devsecops
Businesses face challenges when modernising their software and IT systems. Here are seven important considerations to navigate the process successfully.
Gettyimages 1353159459

High profile attacks, ransomware gangs and weaponisation part of cybersecurity predictions for 2022

Mon, 22nd Nov 2021
#
malware
#
ransomware
#
pam
Cybersecurity trends for 2022 include more high-profile attacks, ransomware gangs, weaponisation, and supply chain attacks, according to HP.
Gettyimages 1301188890

Guardicore steps in against ransomware attacks with latest release

Fri, 19th Nov 2021
#
malware
#
ransomware
#
pam
Guardicore releases new features to simplify segmentation policy creation and strengthen ransomware protection in complex enterprise environments.
Greenlight2

Green Light Worldwide welcomes new NZ senior resource manager Regie Saylo

Tue, 16th Nov 2021
#
it services
#
workforce technology
#
green light
Regie Saylo joins Green Light as senior resource manager for New Zealand, aiming to enhance local recruitment efforts.
Gettyimages 1183011866

Report: Organisations must be proactive, not reactive when it comes to security

Mon, 1st Nov 2021
#
advanced persistent threat protection
#
risk & compliance
#
outage
83% of companies suffer business damage during the first day of an IT outage, according to new research from Netenrich.
Gettyimages 1058694620

Attivo Networks launches credential-cloaking tool to deter data thieves

Thu, 9th Sep 2021
#
iam
#
cybersecurity
#
cybersafety
The tool is part of Attivo's Endpoint Detection Net suite, and is aimed at enabling organisations to hide credentials from would-be attackers and their tools.
Gettyimages 889534052

Palo Alto Networks brings more power to security teams with Cortex XDR 3.0

Thu, 2nd Sep 2021
#
firewalls
#
network infrastructure
#
network security
Palo Alto Networks is expanding its XDR solution to help organizations protect against cloud and identity-based threats.