Skip to content

Digital Privacy

  • Digital
  • Digital Blog
  • Cybersecurity
  • Technology
  • Analytics
Digital Privacy
  • Digital

    North Korean Hackers Weaponize Fake Research to Deliver RokRAT Backdoor

    January 22, 2024

    Jan 22, 2024NewsroomCyber Attack / Hacking Media organizations and high-profile experts in North Korean affairs have been at the receiving end of a new campaign orchestrated by a threat actor…

    Read More North Korean Hackers Weaponize Fake Research to Deliver RokRAT BackdoorContinue

  • Digital

    MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries

    January 22, 2024

    Several public and popular libraries abandoned but still used in Java and Android applications have been found susceptible to a new software supply chain attack method called MavenGate. “Access to…

    Read More MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned LibrariesContinue

  • Digital

    Limiting remote access exposure in hybrid work environments

    January 22, 2024

    Remote work began as a temporary measure during the pandemic but has long been a permanent fixture in our new way of working. Organizations have shifted to remote desktop work…

    Read More Limiting remote access exposure in hybrid work environmentsContinue

  • Digital

    Top security conferences in 2024

    January 22, 2024

    Security conferences provide both public and private sector security leaders with an opportunity to network with colleagues, learn about new business & security strategies to develop their own physical security…

    Read More Top security conferences in 2024Continue

  • Digital

    North Korea’s ScarCruft APT group targets infosec pros

    January 22, 2024

    Cybersecurity researchers and threat analysts are high on the list of valuable targets for nation-state advanced persistent threat (APT) actors. Not only can information security personnel provide access to non-public…

    Read More North Korea’s ScarCruft APT group targets infosec prosContinue

  • Digital

    US Agencies Issue Cybersecurity Guide in Response to Cybercriminals Targeting Water Systems

    January 22, 2024

    US federal agencies have teamed up to release a cybersecurity best practice guidance for the water and wastewater sector (WWS). The Cybersecurity and Infrastructure Security Agency (CISA), United States Environmental…

    Read More US Agencies Issue Cybersecurity Guide in Response to Cybercriminals Targeting Water SystemsContinue

  • Digital

    Microsoft named a Leader in the 2023 Gartner® Magic Quadrant™ for Container Management

    January 18, 2024

    Cloud-native technologies like containers and Kubernetes are the future of application development. That’s why we’re honored to announce that Microsoft has been named a Leader in the 2023 Gartner® Magic…

    Read More Microsoft named a Leader in the 2023 Gartner® Magic Quadrant™ for Container ManagementContinue

  • Digital

    Dynatrace and the Microsoft commercial marketplace: AI-powered cloud transformation

    January 17, 2024

    In today’s digital landscape, the cloud has become a cornerstone for over 90%1 of organizations. This widespread adoption brings a growing complexity to cloud portfolios as companies navigate the challenges…

    Read More Dynatrace and the Microsoft commercial marketplace: AI-powered cloud transformationContinue

  • Digital

    AWS Supply Chain update: Three new modules supporting upstream activities

    January 16, 2024

    We are launching three new modules for AWS Supply Chain today. These modules are designed to help you collaborate with your suppliers across all tiers of your supply chain, with…

    Read More AWS Supply Chain update: Three new modules supporting upstream activitiesContinue

  • Digital

    Transmission of Sensitive Data Policy

    January 16, 2024

    Data in transit means data is at risk if the proper precautions aren’t followed. Data stored inside a securely monitored environment is much less likely to fall into the wrong…

    Read More Transmission of Sensitive Data PolicyContinue

Page navigation

Previous PagePrevious 1 … 5 6 7 8 9 10 Next PageNext

© 2025 Digital Privacy - WordPress Theme by Kadence WP

  • Digital
  • Digital Blog
  • Cybersecurity
  • Technology
  • Analytics