Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
HPE plans to expand its Aruba SASE platform with Axis Security’s Atmos, delivering a comprehensive edge-to-cloud, network and security solution as a service. → Read More
Although threat actors continue to use phishing, brand impersonation, and business email compromise (BEC) as common tactics, use of less familiar attack methods to infiltrate global organizations have picked up, Proofpoint says. → Read More
GoDaddy has identified a December 2022 malware incident on its hosting servers as part of a series of attacks on the company infrastructure since 2020. → Read More
While ransomware and business email compromise are leading causes of cybersecurity threats, geopolitics and deepfakes play an increasing role, according to reports from VMware and Palo Alto. → Read More
Axis is also offering migration tools and a buyback program for those looking to move from legacy ZTNA (zero trust network access) applications. → Read More
Healthcare organizations saw average cost per breach at $10.1 million, more than double the global average. → Read More
Microsoft tops Vade's phishing report, which has some good news: The overall number of phishing attacks declined in the second quarter. → Read More
With the new capability, Teleport hopes to replace usernames, passwords, private keys, and other secrets with more secure physical identity solutions such as Touch ID, Windows Hello and Trusted Platform Module hardware. → Read More
The cloud-native security provider wants to help customers gain visibility into all of their containers, as well as uncover a growing array of threats across multicloud environments. → Read More
Deloitte's new Zero Trust Access service and HCL's collaboration with Palo Alto Networks mark a sustained trend towards offering Zero Trust security services for clients. → Read More
Major attacks on industrial systems are on the rise, yet security efforts to protect these systems continue to lag behind. → Read More
The new edition of the company’s data protection software DPX 4.8.1 adds backup for Microsoft 365 and other open virtualization platforms, including RedHat, Oracle, XenServer and KVM. → Read More
Only 12% of companies in Asia quantify their financial exposure to cyber threats, less than half the global average of 26% according to a recent study by Microsoft and Marsh. → Read More
RCS Lab spyware uses known exploits to install harmful payloads and steal private user data, according to a Google report. → Read More
The annual RSA Conference is an opportunity for companies to showcase their latest cybersecurity products. Here are some of the most interesting new products being shown at RSA Conference 2022. → Read More
Cybersecurity startup companies use the RSA Conference to make their public debut and showcase their products. Here are some of the more interesting security startups showcasing their capabilities this year. → Read More
HYAS Confront uses domain expertise and proprietary machine learning to monitor and detect anomalies in production network environments and improve visibility as applications move to the cloud. → Read More
The SaaS version of ThreatStryker will build on its real-time observation and protection abilities, spanning multiple cloud and development instances. → Read More
Rezilion’s new Dynamic SBOM (software bill of materials) works with its devsecops platform and is designed to help security teams understand how software components are being executed in runtime. → Read More
The Audience Hijacking Protector by Akamai is a cloud-based solution to help protect in-browser attacks including marketing fraud and other malicious redirections. → Read More