Jakob Østergaard, CTO, Keepit, met online along with A3 Communications, explains Keepit’s technologies and growth (...)
You might have heard of a Security Operations Centre (SOC), but do you know it can be offered as a service? When considering (...)
We had the pleasure of exchanging ideas with the multifaceted and talented Elizabeth Ekedoro. From Biology to Fashion design (...)
Today, many companies and workers must mitigate the challenge of ensuring cybersecurity when handling sensitive data or classified information. (...)
Trend Micro Incorporated reveals that UK IT security leaders believe it would take a loss of around £145,000 from a cyber incident to incentivise (...)
There is much excitement around the potential of AI to transform entire industries, from streamlining operations to creating new revenue streams. (...)
XM Cyber released the findings of its third annual research report, Navigating the Paths of Risk: The State of Exposure Management. Produced in (...)
Amid reports from Britain’s GCHQ spy agency that rapid artificial intelligence (AI) development will increase cyberattacks, global cybercrime (...)
LexisNexis® Risk Solutions has unveiled the findings of its 2023 LexisNexis® True Cost of Fraud™ Study – Europe, Middle East and Africa. The annual (...)
A newly published guide from CREST looks into the different types of CTI – standalone deliverables and continued threat monitoring services – and crucially, how this discipline can be used to predict, prevent, detect and respond to threats. The (...)
Identity & Access Governance is a must for every business. Unfortunately, the way it is commonly done today is inefficient and cumbersome. It is latest time to review the approaches on Identity & Access Governance and implement lean (...)
New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr