Saturday, March 2, 2024
Gearset Achieves HIPAA Compliance
Gearset Achieves HIPAA Compliance
Keeper Security Joins the AWS Partner Network
Keeper Security Joins the AWS Partner Network
Semperis Researchers Discover a New Malicious Variant of the Attack Technique used in the 2020 SolarWinds Breach
Semperis Researchers Discover a New Malicious Variant of the Attack Technique used in the 2020 SolarWinds Breach
Symmetry Systems Unveils New OCR Image Analyzer to Transform Data Security and Compliance
Symmetry Systems Unveils New OCR Image Analyzer to Transform Data Security and Compliance
Infoblox Exposes Savvy Seahorse, a DNS Threat Actor Behind Massive Financial Scams
Infoblox Exposes Savvy Seahorse, a DNS Threat Actor Behind Massive Financial Scams
New Viakoo Survey Finds Less Than Half of IT Leaders are Confident in their IoT Security Plans
New Viakoo Survey Finds Less Than Half of IT Leaders are Confident in their IoT Security Plans
LRQA Nettitude partners with LogRhythm to offer managed Axon solution in UK first
LRQA Nettitude partners with LogRhythm to offer managed Axon solution in UK first
Tufin Acquires AKIPS to Bring Customers Enhanced Visibility into Network Operations and Performance
Tufin Acquires AKIPS to Bring Customers Enhanced Visibility into Network Operations and Performance
eScan Showcases its Comprehensive Cybersecurity Solutions at IBEX India 2024
eScan Showcases its Comprehensive Cybersecurity Solutions at IBEX India 2024
Axians Switzerland Partners with Sectigo To Bring Cloud-Native CLM to Their Customers
Axians Switzerland Partners with Sectigo To Bring Cloud-Native CLM to Their Customers
Fortress Information Security Deploys Automated Patch Notification and Authenticity tool to help secure Critical Assets from Hostile Nation-States
Fortress Information Security Deploys Automated Patch Notification and Authenticity tool to help secure Critical Assets from Hostile Nation-States
Hydra: Plugging the Unnoticed Hole in Cybersecurity
Hydra: Plugging the Unnoticed Hole in Cybersecurity
Over two-thirds of IT security decision-makers report an increase in cybersecurity budgets for 2024
Over two-thirds of IT security decision-makers report an increase in cybersecurity budgets for 2024
Menlo Security Unveils the First Cloud-delivered Secure Enterprise Browser, Setting the Highest Standard in Browser Security
Menlo Security Unveils the First Cloud-delivered Secure Enterprise Browser, Setting the Highest Standard in Browser Security
Temu Achieves MASA Certification, Reinforcing Commitment to User Security and Privacy
Temu Achieves MASA Certification, Reinforcing Commitment to User Security and Privacy
Common-Phishing-Scams-and-How-to-Avoid-Them

Common Phishing Scams and How to Avoid Them

Phishing scams are one of the common forms of cybercrime, and they continue to...
strong security

Security Needs to be Joint Leadership Responsibility

With increasing tools, risks, and regulations, the onus of ensuring security is strong falls...
Kubernetes

Kubernetes and Cybersecurity

Subscribe to our Newsletter


    By checking this box, you agree to receive newsletters and communications.

    threat actors

    Expect AI to be a tool and a target for threat...

    It’s been another 12 months full of incident in cybersecurity. But for business and...
    All-You-Want-to-Know-About-Social-Engineering-Attacks

    All You Want to Know About Social Engineering Attacks

    Cybersecurity threats are becoming increasingly sophisticated and challenging to detect. Social engineering attacks are one such threat, where attackers use the human propensity to...

    Trending Articles

    INFOCUS

    Meta fixes a Facebook account takeover vulnerability
    Meta fixes a Facebook account takeover vulnerability
    Cisco Patches Critical Vulnerabilities in the Data Center Operating System
    Cisco Patches Critical Vulnerabilities in the Data Center Operating System
    Discount Retailer Pepco suffers a EUR 15 million loss to cybercriminals
    Discount Retailer Pepco suffers a EUR 15 million loss to cybercriminals
    Common Phishing Scams and How to Avoid Them
    Common Phishing Scams and How to Avoid Them
    Gearset Achieves HIPAA Compliance
    Gearset Achieves HIPAA Compliance
    Keeper Security Joins the AWS Partner Network
    Keeper Security Joins the AWS Partner Network
    Chinese Cyberspies Infiltrate Ivanti VPN Attacks with New Malware
    Chinese Cyberspies Infiltrate Ivanti VPN Attacks with New Malware
    Intel Core Ultra vPro Platform Introduces New Security Features
    Intel Core Ultra vPro Platform Introduces New Security Features
    Personal Data Hacked From Pharmaceutical Giant Cencora
    Personal Data Hacked From Pharmaceutical Giant Cencora
    Semperis Researchers Discover a New Malicious Variant of the Attack Technique used in the 2020 SolarWinds Breach
    Semperis Researchers Discover a New Malicious Variant of the Attack Technique used in the 2020 SolarWinds Breach
    Symmetry Systems Unveils New OCR Image Analyzer to Transform Data Security and Compliance
    Symmetry Systems Unveils New OCR Image Analyzer to Transform Data Security and Compliance
    Infoblox Exposes Savvy Seahorse, a DNS Threat Actor Behind Massive Financial Scams
    Infoblox Exposes Savvy Seahorse, a DNS Threat Actor Behind Massive Financial Scams
    Black Basta and Bl00dy Ransomware Exploit Recent ScreenConnect Flaws
    Black Basta and Bl00dy Ransomware Exploit Recent ScreenConnect Flaws
    Data Breach Affects 67,000 U-Haul Customers
    Data Breach Affects 67,000 U-Haul Customers
    NIST Officially Releases Cybersecurity Framework 2.0
    NIST Officially Releases Cybersecurity Framework 2.0