We are excited to share that Dynatrace has been named the Cloud Security Platform of the Year in the...
Application Security Application security Awards Observability cybersecurity observability
One of the most powerful weapons at an attacker’s disposal is the use of specialized tools designe...
A bring your own device policy is more important than ever since users can bring unsecured personal ...
Have you ever heard of the 80/20 rule? The 80/20 rule, also known as the Pareto principle, was named...
AD misconfigurations Log360 Top 10 misconfigurations cybersecurity misconfigurations
Top tips is a weekly column where we highlight what’s trending in the tech world today and list wa...
Cybersecurity General attack surface management microsegmentation patch management risk mitigation
Top tips is a weekly column where we highlight what’s trending in the tech world today and list wa...
Cybersecurity General cyber-résilience disaster recovery incident response
Five worthy reads is a regular column on five noteworthy items we have discovered while researching ...
Five worthy reads is a regular column on five noteworthy items we have discovered while researching ...
In an era defined by unprecedented digitalization, the security of information and data holds paramo...
#dataprivacy Cyber Technologies Cybersecurity General Government sector Privacy Act Privacy laws USA IT laws
Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to ...
Cybersecurity Deepfake General ai social engineering voice cloning
Dans le paysage en évolution rapide de la cybersécurité, le cadre de certification de cybersécur...
Cybersecurity Skills Academy Cybersécurité ENISA Guide des administrateurs informatiques UE cadre de certification de cybersécurité européen