Checkmarx enables users to integrate its AST solutions into the GitLab CI/CD pipeline
Checkmarx announced its new strategic partnership with GitLab, the single application for the DevOps lifecycle, enabling users to integrate Checkmarx’s leading application …
Everstream and Windstream to deploy 400GbE Wavelength Services
Everstream and Windstream announced the operational turn-up of long-haul 400 Gigabit Ethernet (GbE) Wavelength Services, marking one of the industry-first deployments for a …
Innodisk and DFI provide dual remote management solution for IoT devices
The exponential growth of IoT devices brings a new challenge: how to effectively manage and monitor large numbers of connected devices that may be hard to access in …
Palo Alto Networks to acquire Crypsis Group to expand capabilities and strengthen strategy
Palo Alto Networks announced that it has entered into a definitive agreement to acquire The Crypsis Group, a leading incident response, risk management and digital forensics …
Julia Chu appointed Chief Risk Officer at Markel
Markel announced that Julia Chu has been appointed Chief Risk Officer, effective immediately. In this new role, Chu will be responsible for Markel’s enterprise risk …
Kamal Hathi joins DocuSign as CTO
DocuSign announced the appointment of Kamal Hathi as its new chief technology officer (CTO) to support the expansion of the DocuSign Agreement Cloud. With over 25 years of …
Amir Elbaz, BeyondEdge CEO, named to Board of Directors for Building Cyber Security
BeyondEdge announced its CEO has been named to the Board of Directors for Building Cyber Security (BCS), the leading non-profit organization focused on improving and advancing …
Three places for early warning of ransomware and breaches that aren’t the dark web
For better or worse, a lot of cybercrime sleuthing and forecasting tends to focus on various underground sites and forums across the deep and dark web corners of the Internet. …
ERP security: Dispelling common misconceptions
Enterprise resource planning (ERP) systems are an indispensable tool for most businesses. They allow them to track business resources and commitments in real time and to …
PinK: A new way of implementing a key-value store in SSDs
As web services, cloud storage, and big-data services continue expanding and finding their way into our lives, the gigantic hardware infrastructures they rely on–known …
New attack vectors make securing virtual companies even more challenging
As organizations are settling into long-term remote working, new attack vectors for opportunistic cyberattackers—and new challenges for network administrators have been …
The evolution of IoT asset tracking devices
Asset tracking is one of the highest growth application segments for the Internet of Things (IoT). According to a report by ABI Research, asset tracking device shipments will …
Featured news
Resources
Don't miss
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform
- BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation