Attest stories - Page 5

Aqua Security only vendor that can meet US EO requirements
Fri, 11th Nov 2022
#
application security
#
supply chain & logistics
#
cybersecurity
Aqua Security helps software vendors meet compliance requirements of US Executive Order 14028, improving cybersecurity and preventing cyber incidents.

Making the case for decentralised identity
Tue, 1st Nov 2022
#
data analytics
#
martech
#
cdp
Rising online fraud and identity theft are causing an identity crisis, but decentralised digital identity could be the solution.

GitLab aims to secure end-to-end software supply chains
Fri, 28th Oct 2022
#
paas
#
devops
#
application security
The One DevOps Platform enables organisations to stay ahead of threat vectors, maintain compliance posture, and deliver secure software faster.

DigiCert Root CA approved for Matter device attestation
Fri, 14th Oct 2022
#
iot security
#
smart home
#
risk & compliance
With this, DigiCert is ready to help smart home device manufacturers achieve Matter compliance rapidly and at scale.

Intel accelerates innovation with software-first approach
Tue, 4th Oct 2022
#
saas
#
quantum computing
#
open source
Intel introduced new services and tools in AI, security and quantum computing to help developers reduce time-to-market and increase performance and security.

Pronto launches Xi innovation to bring data to light
Wed, 28th Sep 2022
#
data analytics
#
digital transformation
#
cloud security
With the importance of digital transformation, having an ERP and analytics solution to bring data to light is critical.

Safeguarding your financial data
Tue, 16th Aug 2022
#
data protection
#
fintech
#
breach prevention
Managing data security is crucial in the digital revolution. Here are five steps towards better financial data security.

Shopping for cyber insurance? Six questions to ask before calling the insurer
Wed, 4th May 2022
#
malware
#
ransomware
#
risk & compliance
The cyber threat landscape has always been worrisome, but today these concerns are heightened given an anticipated uptick in cyber-attacks from bad actors.

Zoom puts greater focus on the platform's security and privacy
Fri, 29th Apr 2022
#
data privacy
#
cloud services
#
cybersafety
Zoom has recently received a variety of third-party certifications, unveiled product innovations, and established programs, focusing on security and privacy.

Why it's essential to focus on security fundamentals
Wed, 27th Apr 2022
#
dr
#
encryption
#
mfa
The White House has issued comprehensive cybersecurity recommendations to protect against potential Russian cyber-attacks.

The future of digital identity: the need for systems reform
Thu, 7th Apr 2022
#
physical security
#
cybersecurity
#
identity theft
Identity credentialing, proving you are who you say you are, needs to catch up to the technologies available. Currently, most organisations use simple means.

Qualys steps into future of EDR with latest release
Wed, 6th Apr 2022
#
advanced persistent threat protection
#
risk & compliance
#
edr
Qualys has launched Multi-Vector EDR 2.0 with additional threat-hunting and risk mitigation capabilities, designed to improve alert prioritisation.

Password hygiene in New Zealand: Statistics, standing and standpoints
Wed, 30th Mar 2022
#
data protection
#
data analytics
#
martech
The state of password hygiene in New Zealand remains largely unknown, with limited studies and fragmented data.

Using marketplace technology to build an online community around your brand
Mon, 7th Mar 2022
#
ecommerce
#
customers
#
branding
Online marketplaces now account for half of all eCommerce sales globally, offering businesses a 30-50% increase in turnover in the first year.

Business to business: Top tips for becoming a trusted eCommerce supplier in 2022
Tue, 8th Feb 2022
#
uc
#
martech
#
ecommerce
Clocking up fewer sales calls and booking more business via your company website these days? You and just about every other B2B business owner in Australia.

ESET named strategic leader in endpoint prevention and response
Fri, 28th Jan 2022
#
endpoint protection
#
edr
#
cybersecurity
ESET achieved high scores in the categories of active prevention, passive response, and combined prevention/response capabilities, scoring 96%, 100%, and 98%.

New Zealand – let’s get your IT supply chain secured!
Mon, 17th Jan 2022
#
supply chain & logistics
#
cybersecurity
#
solar power
IT supply chain attacks are on the rise, with up to 40% of breaches originating from weak supply chains. It's time for organisations to wake up to the risks.

Supply chain infrastructure and network security the focus of new Extreme Networks solution
Fri, 17th Dec 2021
#
network infrastructure
#
multi-cloud
#
supply chain & logistics
Extreme Networks Inc. has announced a new technology solution designed to protect critical network infrastructure.

Laika improves IT audit process with latest release
Wed, 15th Dec 2021
#
risk & compliance
#
it audit
#
regulation
Laika launches Laika+, an audit solution designed to streamline IT audits and support companies with SOC 2 compliance.

Forrester has released a series of predictions for 2022
Tue, 16th Nov 2021
#
edge computing
#
cybersecurity
#
healthtech
Forrester's reports predict that tech executives in 2022 will focus on human-centered transformation, cloud-native strategies, and cybersecurity challenges.