Author Archives: Jessica Lyons Hardcastle
Author Archives: Jessica Lyons Hardcastle
Converged IT and OT security platforms are one way that service providers and security vendors are...
Samantha Madrid joined the company with a very specific security strategy: change how we secure...
Microsoft said it’s “aware of limited targeted attacks” using the remote-code execution...
This includes $8 million in cash, $210 million in products, and up to $5 million in grants and...
While the AWS initiative will initially focus on COVID-19, AWS says it “will also consider other...
Security company Critical Start and its threat hunters are among the global contributors running...
All of these bugs require some form of authentication, which makes them more difficult to exploit....
In addition to leading the Series B, Juniper and Cox are also StackPath customers although they use...
The OCP-compliant Inspur system includes Nvidia GPUs and enables composability via PCIe...
“Oracle inaccurately reported during its Q3 earnings call that DTCC was migrating a...
The world’s largest tech companies are looking to use their technology for ways to accelerate...
Collaboration and deception are two tools that Manky says should play a prominent role in...
While other tech companies have blamed COVID-19 for recent revenue declines, citing supply chain...
“Vulnerability management, configuration management, patch management — those things should...
Between 2016 and 2019, Necurs was the most prominent spam and malware-delivery method and was...
Tofino’s P4 programmability is what makes it important to Stateless, a startup targeting...
“Confidential computing is one of the most important and relevant new paradigms that you folks...
This programmable fabric with embedded security functions will allow network operators to deploy...
One of the services encrypts and replicates identity data across multiple online servers on the...
Security professionals tend to be at least a moderately paranoid bunch, and adding a real virus to...