How to add the Docker Scout feature to the Docker CLI

In this TechRepublic How to Make Tech Work tutorial, Jack Wallen shows you how to add the Docker Scout feature to the Docker CLI. [embedded content] You might have heard of Docker... Read more »

Gigamon’s Cloud Security Report Shares Insights on Undetected Breaches & Deep Observability

Image: UnderhilStudio/Shutterstock Findings in network intelligence firm Gigamon’s Hybrid Cloud Security Survey report suggest there’s a disconnect between perception and reality when it comes to vulnerabilities in the hybrid cloud: 94% of... Read more »

Aqua Security Study Finds 1,400% Increase in Memory Attacks

Analysis of 700,000 real-world attacks shows how memory attacks evade protections and suggest mitigations. Image: tippapatt/Adobe Stock Threat actors are honing their focus on exploits that evade detection and remain unnoticed within... Read more »

Syxsense Unveils Novel Unified Endpoint Management Strategy

Syxsense now offers more IT and endpoint management functions, including mobile device management, automation, remediation and zero trust. Image: Adobe Stock/ArtemisDiana Syxsense recently unveiled its all-encompassing suite – Syxsense Enterprise, which comes... Read more »

What is Data Loss Prevention (DLP)?

DLP helps organizations protect their sensitive data. Learn about the best practices and tools available to prepare for and prevent data loss. Image: Adobe Stock/alvaher Data loss prevention enables organizations to protect... Read more »

Dell Technologies World 2023: Q&A on how Dell sees security at the edge

Image: Adobe Stock In May 2023, Dell announced NativeEdge, an edge operations software platform. Dell has been talking to customers for years in advance of the release about the needs of technology... Read more »

Palo Alto Networks CTO Talks Securing ‘Code to Cloud’

Image: Timon/Adobe Stock Palo Alto Networks held its annual Code to Cloud Cybersecurity Summit Thursday, focusing on cloud, DevOps and security. Experts discussed trends, opportunities and challenges with coding and the cloud.... Read more »

Remote work and the cloud create new endpoint security challenges

Cybersecurity has always been challenging, but with the cloud becoming more complex, the Internet of Things more advanced and remote work more embraced, security and endpoint management face a host of new... Read more »

Akamai’s new study: Bots, phishing and server attacks making commerce a cybersecurity hotspot

The study shows attackers are using more bots and doing more sophisticated phishing exploits and server attacks, especially targeting retail. Image: Sashkin/Adobe Stock Attacks on commerce are booming, according to a new... Read more »

New phishing and business email compromise campaigns increase in complexity, bypass MFA

Read the technical details about a new AiTM phishing attack combined with a BEC campaign as revealed by Microsoft, and learn how to mitigate this threat. Image: MASHKA/Adobe Stock A report from... Read more »