your market intelligence analyst
Search Results
Edit Save
15,515 results
Security Bloggers Network 04/06/2020 18:02
How PolicyPak can Secure Your Remote Work Environments Long after Coronavirus is Gone Coronavirus is challenging our world, our governments and our communities. The circumstances it creates doesn’t have to challenge your enterprise however. Like many organizations, you have probably enacted a remote work policy. While it may seem like a daunting task to... . .
Security Bloggers Network 04/06/2020 15:16
The United States Congress ratified the Cybersecurity Framework set forth by the National Institute of Standards and Technology (NIST) in 2014 to standardize the practices and controls that mitigate constantly evolving cyberthreats. The framework has been adopted by federal and local government entities as well as a growing number of global businesses, including JP Morgan […]. . .
Security Bloggers Network 04/06/2020 11:07
The Firefox Internet browser received a critical patch from the Mozilla Foundation to fix a couple of actively exploited zero-day vulnerabilities that were endangering both regular users and institutions. Zero-day vulnerabilities in Internet browsers are dangerous because criminals and hackers can use them with great success in a wide range of criminal schemes. Regular users […]. .
Security Bloggers Network 04/06/2020 10:45
Just a few weeks ago, my colleague wrote a blog about the importance of having and not simply hawkers of products. This has become even more important as security teams try to adapt to the challenges and pressures introduced by the COVID-19 pandemic. Many organizations are accelerating their migration to cloud-based applications both to reduce costs and to simplify the availability of applications as more users work from home. At the same time, budgets are increasingly uncertain as teams look to control costs in the face of uncertainty. For AppSec teams, this creates a classic need to “do more with less”. While many organizations are being asked to cut back, it is important to remember that attackers are doing just the opposite. This sort o.
Security Bloggers Network 04/06/2020 10:13
Five misconfigured Amazon Web Services (AWS) S3 buckets revealing private data of Key Ring users were discovered by vpnMentor researchers in January. Like many similar apps, Key Ring lets users store digital copies of their loyalty cards, create a shopping list, receive weekly deals, and benefit from new loyalty programs. Some users, however, use the […]. .
Security Bloggers Network 04/06/2020 09:46
The State of New York has decided to ban Zoom from city schools amid news of security and privacy concerns surrounding the popular videoconferencing software. “DOE staff and service providers should cease using Zoom as soon as possible,” Department of Education Chancellor (DOE) Richard Carranza said last week. The COVID-19 pandemic has forced people around […]. .
Security Bloggers Network 04/06/2020 09:45
The (ACSC), under the direction of the (ASD), offers security advice to protect national infrastructure. DevSecOps practitioners in the private sector, as well as state and territory governments, are encouraged to quantify their current cyber security maturity status and consider plans that transform their organizations to higher levels. "Now is a good time for businesses to be more aggressive in blocking potentially malicious emails and websites from their network gateway. Now more than ever, it is critical that businesses have their software patched and up to date," ACSC acting Head, Karl Henmore. .

Information Technologies

IT Markets

Business Issues

Companies - Public

Companies - Venture Funded


Analyst Firms

Global Markets

Global Risk Factors

Government Agencies

Job Titles

Legal and Regulatory

Political Entities


Strategic Scenarios



On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 

  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications