Red Hat’s latest releases accelerate workflows and enhance the developer experience
Red Hat announced updates to its portfolio of developer tools, bringing new capabilities that further equip customers to build, deploy and manage applications in …
Neurotechnology SentiSight.ai now includes additional features and an improved interface
Neurotechnology announced the release of a new version of its SentiSight.ai image labeling and recognition platform. The new release includes some additional features and an …
Red Hat OpenShift 4.5: Breaking down app barriers between traditional and cloud-native infrastructure
Red Hat announced the general availability of Red Hat OpenShift 4.5, the latest version of the industry’s most comprehensive Kubernetes platform. Red Hat OpenShift 4.5, which …
NeuVector now offers extensive compliance reporting and enforcement for PCI DSS, GDPR
NeuVector released the newest version of its cloud-native Kubernetes security platform. The enterprise-trusted, build-to-production container security solution now includes …
Viasat MDD now available for the new Samsung Galaxy S20 Tactical Edition solution
Viasat announced its Mobile Dynamic Defense (MDD) cybersecurity software is now available for the new Samsung Galaxy S20 Tactical Edition (TE) solution. The Viasat MDD …
HID Global acquires Access-IS to broaden technology portfolio, boost market expansion
HID Global announced that it has acquired Access-IS to broaden HID Global’s technology portfolio, accelerate its vertical market expansion, and add new product offerings that …
Potential Apache Struts 2 RCE flaw fixed, PoCs released
Have you already updated your Apache Struts 2 to version 2.5.22, released in November 2019? You might want to, and quickly, as information about a potential RCE vulnerability …
New IBM POWER10 processor has transparent memory encryption for end-to-end security
IBM revealed the next generation of its IBM POWER CPU family: IBM POWER10. Designed to offer a platform to meet the unique needs of enterprise hybrid cloud computing, the IBM …
3 tips to increase speed and minimize risk when making IT decisions
There is nothing like a crisis to create a sense of urgency and spawn actions. This is especially true for enterprise IT teams, who are tasked with new responsibilities and …
Users turn to independent search engines for privacy, but also get misinformation
Anti-vaccine websites, which could play a key role in promoting public hesitancy about a potential COVID-19 vaccine, are far more likely to be found via independent search …
Internal audit leaders should develop new skills to stay relevant
Chief audit executives (CAEs) and internal audit leaders report their next-generation competency levels in three vital areas – governance, methodology and enabling technology …
Healthcare breaches declined sharply during the first half of 2020
This has been a very challenging year. Despite the COVID-19 outbreak starting in the first half of 2020, data analyzed from the Health and Human Services (HHS) Office for …
Featured news
Resources
Don't miss
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform
- BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation