FiberLight selects Fujitsu 1FINITY platform and Virtuora to expand its high-bandwidth fiber network
Fujitsu Network Communications announced that fiber infrastructure provider FiberLight has selected the Fujitsu 1FINITY platform and Virtuora Network Control Solution to …
New partners to integrate LoginID FIDO-as-a-Service
LoginID has announced new partnerships as part of its launch of FIDO-as-a-Service, for small and medium sized enterprises. This follows on its recent announcement for the …
Alvaro Ladoux joins Group-IB as new Business Development Manager for Spain and LATAM
Group-IB, a global threat hunting and intelligence company headquartered in Singapore, announces the appointment of Alvaro Ladoux as the company’s new Business Development …
Henri Richard becomes board advisor at Excelero
Excelero, a disruptor in software-defined block storage for AI/ML/deep learning and GPU computing, announced that longtime enterprise technology executive and strategist Henri …
Jerrod Stoller joins Digital Envoy as new president
Digital Envoy, the inventor of IP intelligence, announced that Jerrod Stoller has been appointed as its new President. Current President and CEO Bill Calpin has stepped back …
Anitian appoints Rakesh Narasimhan as new CEO
Anitian announced Rakesh Narasimhan as the company’s new CEO. Andrew Plato, founder of Anitian and founding CEO, takes the role of Chief Technology Officer to oversee …
July 2020 Patch Tuesday: Microsoft plugs wormable Windows DNS Server RCE flaw
On this July 2020 Patch Tuesday, Microsoft has plugged 18 critical and 105 high-severity flaws, Adobe has delivered security updates for ColdFusion, Adobe Genuine Service, …
Critical flaw gives attackers control of vulnerable SAP business applications
SAP has issued patches to fix a critical vulnerability (CVE-2020-6287) that can lead to total compromise of vulnerable SAP installations by a remote, unauthenticated attacker. …
How do I select a network detection and response solution for my business?
Network detection and response (NDR) solutions enable organizations to improve their threat response, they help protect against a variety of threats, and also provide …
Ransomware, then and now: The change in data theft behavior
The rising number of people working from home have left more businesses at risk from ransomware than ever before. Gaps in network security, shadow IT and a greater reliance on …
Researchers extract personal data from video conference screenshots
Video conference users should not post screen images of Zoom and other video conference sessions on social media, according to Ben-Gurion University of the Negev researchers, …
Remote working security challenges urge MFA implementation
The past few years have seen an increase in employees using personal devices and systems to access work emails and company databases, and exchange valuable information with …
Featured news
Resources
Don't miss
- How AI is reshaping attack path analysis
- What happens when cybersecurity knowledge walks out the door
- AI-driven scams are eroding trust in calls, messages, and meetings
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform