Expand your cloud expertise: Discount on CCSP training
This promotion has ended. Challenging times call for exceptional measures. And (ISC)² is committed to helping you keep your Certified Cloud Security Professional (CCSP) …
NICE Actimize launches Xceed, an AI cloud-native financial crime risk management solution
NICE Actimize announced the launch of its newest platform, NICE Actimize Xceed, which integrates best-in-class AI, data intelligence, behavioral analytics, and insights within …
ACA Compliance Group unveils mobile app version of its ComplianceAlpha platform
ACA Compliance Group (ACA) announced the launch of the mobile app version of its ComplianceAlpha platform for risk and compliance management. Designed to provide financial …
ISO defines standard approach to embed LEIs within digital certificates
ISO has defined a standard approach for Certification Authorities to embed Legal Entity Identifiers (LEIs) within digital certificates. Details outlining the process have been …
ThreatConnect integrates its TIP and SOAR platform with Microsoft Graph Security API
ThreatConnect announced that it has joined the Microsoft Intelligent Security Association and will integrate Microsoft solutions with the ThreatConnect Threat Intelligence …
WekaIO and Destiny Corporation publish reference design to improve SAS analytics workloads
WekaIO together with Destiny Corporation have published a reference design that is capable of delivering 5X runtime and wall clock time improvements for SAS analytics long …
Fileless worm builds cryptomining, backdoor-planting P2P botnet
A fileless worm dubbed FritzFrog has been found roping Linux-based devices – corporate servers, routers and IoT devices – with SSH servers into a P2P botnet whose …
Kali Linux 2020.3 released: A new shell and a Bluetooth Arsenal for NetHunter
Offensive Security has released Kali Linux 2020.3, the latest iteration of the popular open source penetration testing platform. You can download it or upgrade to it. Kali …
Five ways to maximize FIDO
Perform a quick Google search for “causes of data breaches”, and you will be inundated with reports of stolen credentials and weak passwords. Organizations can spend billions …
The benefits of providing employees with an identity compromise solution
Employees find significant value in having access to an identity compromise solution, having an available remediation solution creates a better mindset for those that use it, …
Telehealth is the future of healthcare, but how secure is it?
54 percent of Americans have opted for virtual visits during pandemic, a CynergisTek survey reveals. Of those, more than 70 percent of respondents plan to continue to use …
Large-scale migrations away from on-premise environments are underway
COVID-19 has had a massive effect on DevOps, leading to large-scale migrations away from on-premises environments, a Codefresh survey reveals. At the same time, DevOps …
Featured news
Resources
Don't miss
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform
- BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation