Security & Performance

UAE Tests Breakthrough 5G Speeds with 6 GHz and 600 MHz Bands
Security & Performance UAE Tests Breakthrough 5G Speeds with 6 GHz and 600 MHz Bands

e& UAE has redefined 5G connectivity through innovative testing of the 6 GHz and 600 MHz spectrum bands. In collaboration with the Telecommunications and Digital Government Regulatory Authority (TDRA), tests reached speeds of up to 10 Gbps using the 6 GHz band and extended 5G coverage beyond 6

Portnox Secures $37.5M Series B to Enhance Zero-Trust Solutions
Security & Performance Portnox Secures $37.5M Series B to Enhance Zero-Trust Solutions

Network security startup Portnox has successfully raised $37.5 million in Series B funding, providing a significant boost to its mission to enhance zero-trust security solutions for enterprises. This infusion of capital is poised to accelerate product innovation, expand market reach, and provide

How Can HPE's New Networking Upgrades Enhance Enterprise Security?
Security & Performance How Can HPE's New Networking Upgrades Enhance Enterprise Security?

Hewlett Packard Enterprise (HPE) has recently made significant updates to its HPE Aruba Networking Central solution, introducing new deployment options and security features aimed at bolstering network security for enterprises facing increasingly sophisticated threats and stringent regulatory

Is Your Organization Ready for Quantum-Safe Zero Trust Security?
Security & Performance Is Your Organization Ready for Quantum-Safe Zero Trust Security?

Cloudflare has boldly integrated quantum-safe encryption into its Zero Trust Network Access (ZTNA) tools, addressing the imminent cybersecurity challenges posed by quantum computing. This revolutionary technology is expected to significantly enhance data analysis, operational efficiency, and

Can Fast Flux Be Detected to Counter Cyber Threats?
Security & Performance Can Fast Flux Be Detected to Counter Cyber Threats?

As the incidence of cyber threats continues to rise, cybersecurity agencies worldwide grapple with the challenge posed by Fast Flux—a sophisticated technique used by cybercriminals to conceal the locations of their illicit servers, thereby evading detection and maintaining resilient command and

Phishing Surge Follows Bybit Crypto Heist by North Korean Hackers
Security & Performance Phishing Surge Follows Bybit Crypto Heist by North Korean Hackers

The Bybit cryptocurrency heist has sparked intense scrutiny in the cybersecurity landscape, especially concerning phishing tactics employed by malicious actors. The alleged involvement of North Korean hackers in the theft of $1.5 billion in crypto has led to a significant increase in phishing

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later