IBM Security and AWS help customers reduce security complexity as they move further into the cloud
IBM Security announced new technology initiatives leveraging Amazon Web Services (AWS), designed to help clients simplify and extend their security visibility across AWS and …
Datadog and Snyk unveil GitHub integration to automate software development workflow
Datadog announced the Datadog Vulnerability Analysis GitHub Action, Datadog’s first action listed on the GitHub Marketplace. GitHub Actions provide powerful, flexible CI/CD …
IDEMIA and Kudelski IoT provide identity and access management to drive secure IoT applications
IDEMIA and Kudelski IoT announced a joint solution for mobile network operators (MNOs), mobile virtual network operators (MVNOs), original equipment manufacturers (OEMs) and …
Xerox announces Xavier Heiss as chief financial officer
Xerox announced Xavier Heiss as chief financial officer, a role he’s filled on an interim basis since the end of September. He reports to John Visentin, Xerox vice chairman …
Week in review: FireEye breach, vulnerable TCP/IP stacks, Kali Linux and the future of pentesting
Here’s an overview of some of last week’s most interesting news and articles: FireEye breach: State-sponsored attackers stole hacking tools U.S. cybersecurity …
Ad-injecting malware hijacks Chrome, Edge, Firefox
When searching for things online, has a greater number of ads than usual been popping up at the top of your search results? If it has, and you’re using Microsoft Edge, …
CPRA hints at the future of cybersecurity and privacy
One of the most notable ballot propositions impacting the privacy and cybersecurity world during the US 2020 election was the passage of the California Privacy Rights Act …
2021 predictions: The rise of cyber resilience
Each year seems to come with more cyber threats, “bad actors,” ransomware and data breaches. The security industry is on fire right now with technology providers continuing to …
40% of COVID-19 contact tracing apps lack basic protections
Guardsquare announced the release of a report which reassesses the levels of security protections and privacy risks of COVID-19 contact tracing apps. The report found that of …
Engineers design transistor that disguises key computer chip hardware from hackers
A hacker can reproduce a circuit on a chip by discovering what key transistors are doing in a circuit – but not if the transistor “type” is undetectable. Purdue University …
Most IT decision makers don’t trust data, but 54% still use it to make decisions
77% of IT decision makers (ITDMs) don’t completely trust the data within their organization for timely and accurate decision making, according to SnapLogic. With 98% of those …
Infosys Modernization Suite helps orgs accelerate their end to end modernization needs
Infosys announced the launch of the Infosys Modernization Suite, part of Infosys Cobalt, to help organizations accelerate their end to end modernization needs. Infosys …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month