Calyptix Security, a provider of network security tools for small business, has unveiled the AE1400 UTM firewall, the latest addition to its AccessEnforcer product line ideal for offices with up to 50 people. The new unified threat management firewall comes equipped with 8GB of ECC RAM and is also powered by a 2.0 GHz CPU. […]
Popular Tags within: Network SecurityCyber Security Cyber Attacks Internet of Things Data Security Social Media Cryptocurrency
What types of cyberattacks were carried out this week, June 2, 2017? Read on to find out about the latest cyberattacks and who got hacked this week.
Machine learning software can analyze what your company does daily on the internet. This can be an invaluable tool in the fight for cyber security.
Companies need data to run their businesses. That makes backup and disaster recovery (BDR), especially in the cloud, a necessity for any business utilizing data.
Each week, TechDecisions brings you the latest cyber security news on cyberattacks and who got hacked from around the internet. Cyber security is becoming a main issue for many companies, and our weekly feature is a good example of why. Every week there are multiple stories of people, businesses, and products being hacked for fun, for […]
The hosted business application provider has successfully migrated 500,000 users to the new email protection platform, which replaces software from McAfee.
Moving your network to the cloud can be a daunting task for end users, but in reality cloud migration is a six step process.
What types of cyberattacks were carried out this week, May 19, 2017? Read on to find out who got hacked this week.
Organizations can gain great insight into the types of attacks being carried out and how to prevent them from affecting their business from the Internet Security Threat Report.
As cybersecurity spending around the world continues to skyrocket, healthcare institutions should be as eager as any to strengthen cybersecurity and prevent attacks.