ITQ releases complete AI stack for running private AI workloads
ITQ's new service enables secure AI development while maintaining data ownership, addressing concerns about sensitive data in public cloud infrastructures.
Federal data, security leaders release zero-trust guide ahead of White House deadline
The Federal Zero Trust Data Security Guide emphasizes securing data directly rather than merely protecting the perimeter, crucial for effective zero-trust implementation.
Portsmouth among councils hit by cyber attack
Portsmouth City Council experienced a DDoS cyber attack, affecting website access but not compromising council services or resident data.
Proofpoint acquires data security posture management firm Normalyze
Proofpoint's acquisition of Normalyze aims to strengthen data security through AI-driven management, addressing human-related risks and enhancing compliance.
Two notorious infostealer malware operations were just knocked offline
International law enforcement collaboratively dismantled RedLine and Meta malware operations, significantly enhancing global cybersecurity efforts.
Corporate identity is the new perimeter for data security, but many enterprises overlook how identities are managed across platforms, increasing vulnerability.
ITQ releases complete AI stack for running private AI workloads
ITQ's new service enables secure AI development while maintaining data ownership, addressing concerns about sensitive data in public cloud infrastructures.
Federal data, security leaders release zero-trust guide ahead of White House deadline
The Federal Zero Trust Data Security Guide emphasizes securing data directly rather than merely protecting the perimeter, crucial for effective zero-trust implementation.
Portsmouth among councils hit by cyber attack
Portsmouth City Council experienced a DDoS cyber attack, affecting website access but not compromising council services or resident data.
Proofpoint acquires data security posture management firm Normalyze
Proofpoint's acquisition of Normalyze aims to strengthen data security through AI-driven management, addressing human-related risks and enhancing compliance.
Two notorious infostealer malware operations were just knocked offline
International law enforcement collaboratively dismantled RedLine and Meta malware operations, significantly enhancing global cybersecurity efforts.
Corporate identity is the new perimeter for data security, but many enterprises overlook how identities are managed across platforms, increasing vulnerability.