Breach Detection

The Breach Detection product category is a collection of news, product listings and other resources for security professionals researching Breach Detection solutions.
Courtesy of -- Copyright: dikushin
In an effort to foster a security-aware culture among employees, there has been a shift in thinking. Instead of using generic, one-size-fits-all lessons, the new method focuses on educating the right person at the right time in the right way to instigate change in behavior.

Enterprise organizations expanding cybersecurity training to include customers

March 21, 2023
Large organizations and financial institutions increasingly passing protective measures on to customers as cybercrime continues to intensify
One Span

OneSpan strengthens protection of Web3 with new cloud notarization solution

Feb. 21, 2023
Co-created with OneSpan notary customers, the new solution offers a convenient way to notarize documents digitally with the industry’s highest level of security
Courtesy of -- Copyright: Andrey Suslov
Quantum computing will enable great innovations in the future, but it will be accompanied by diverse risks.
Managed Network Security

The cybersecurity implications of quantum computing

Feb. 21, 2023
Organizations enter a new era of cyber threats despite the exponential technology advances
Darktrace 300x300

New research recommends a holistic approach to cybersecurity

Only 29% of respondents are highly confident they have a robust mechanism to test their environments against the most current threat vectors
Courtesy of -- Copyright: SkazovD
Current backup and recovery solutions are not where the world needs them to be, but that doesn’t mean we should settle for less.
Breach Detection

Rise in cyber threats demand new strategies for data recovery

Feb. 1, 2023
Companies should push vendors to achieve zero RPO and zero RTO
Hornetsecurity Logo
Breach Detection

Hornetsecurity combats QR code phishing with new technology

New threats call for next-gen security solutions as Hornetsecurity unveils new technologies to counter rise in phishing attacks and malicious links