SAFE Phish: Phish testing and training redefined
Mimecast announced an industry changing capability that will allow customers to launch live phishing simulations. Known as SAFE Phish, it’s designed to let security teams …
Verimatrix unveils anti-tamper tech to protect Bitcode-enabled iOS apps
Verimatrix announced new protection for Bitcode-enabled iOS applications. Publishing an app to Apple’s App Store with Bitcode enabled allows Apple to optimize the app’s code …
Intel and VMware extend virtualization to RAN through broadened collaboration for 5G
Intel and VMware are collaborating on an integrated software platform for virtualized Radio Access Networks (RAN) to accelerate the rollout of both existing LTE and future 5G …
Microchip releases Flashtec NVMe 3108 PCIe Gen 4 enterprise NVMe SSD controller
As data centers support more Artificial Intelligence (AI) and Machine Learning (ML) workloads, there is a need for cloud scale infrastructure that provides more bandwidth to …
Patrick Harr becomes CEO of SlashNext
SlashNext announced that security and cloud services veteran Patrick Harr has joined the company as CEO. With a proven track record of leading security and cloud startups, as …
Firefox to block redirect tracking
Mozilla has announced a new Firefox protection feature to stymie a new user tracking technique lately employed by online advertisers: redirect tracking. How does redirect …
BluBracket updates Code Security Suite, adds stolen and leaked code detection
BluBracket introduced significant new functionality to its Code Security Suite, allowing companies for the first time to find stolen and copied source code in public …
Engaging business units in security governance: Why everyone should be concerned
The idea that security is everyone’s business is a familiar refrain. But as enterprises look to combine the speed of software delivery with both cybersecurity and business …
Security analysis of legacy programming environments reveals critical flaws
New research from Trend Micro highlights design flaws in legacy languages and released new secure coding guidelines. These are designed to help Industry 4.0 developers greatly …
As personal use of managed devices becomes ubiquitous, risks increase
Netskope analyzed the most interesting trends on enterprise cloud service and app use, web and cloud-enabled threats, and cloud data migrations and transfers. Based on …
Many companies have not taken basic steps to protect their remote workforce
New research shows almost three quarters of large businesses believe remote working policies introduced to help stop the spread of COVID-19 are making their companies more …
Ways AI could be used to facilitate crime over the next 15 years
Fake audio or video content has been ranked by experts as the most worrying use of artificial intelligence in terms of its potential applications for crime or terrorism, …
Featured news
Resources
Don't miss
- What happens when cybersecurity knowledge walks out the door
- AI-driven scams are eroding trust in calls, messages, and meetings
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform
- BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)