
Connectivity and Access, Unified Communications, Disaster Recovery, Security, Cloud and Infrastructure Services

How GDPR has inspired a global arms race on privacy regulations Attackers create malware for serverless computing platforms like AWS Lambda 2 ways to remove duplicate lines from Linux files New US CISO appointments, April 2022 New PCI Data Security Standard v4.0 receives kudos for flexibility Zoom’s bug bounty ROI clear as program pays $1.8 million to fix over 400 bugs BrandPost: Don’t Bore the Board: 5 CISO Hacks for Highly Effective Presentations BrandPost: Why Security Resilience is the Strategy for the Future LightBeam launches data privacy automation platform to streamline compliance 7 emerging network jobs that could boost your career New threat group underscores mounting concerns over Russian cyber threats What is the risk of retaliation for taking a corporate stance on Russia? How JetBlue creates a culture of security Best advice for responding to today's biggest cyber threats 10 top fuzzing tools: Finding the weirdest application errors Cash App customer investment data hacked Spring4Shell patching is going slow but risk not comparable to Log4Shell Teleport bridges human and machine access management with Machine ID Pages