RtBrick extends cloud-native approach to telco networks by offering two new APIs into its software
RtBrick has extended its cloud-native approach to telco networks by offering two new APIs (Application Programming Interfaces) into its software. RtBrick is already known for …
IronCore Labs announces updates to the Data Control Platform and SaaS Shield
IronCore Labs, the data control and privacy platform, announced several new product features that build on the company’s two core products: the Data Control Platform and …
SANS partners with Elevate Security to shift the industry paradigm to solve for the human element
SANS Institute announces partnership with Elevate Security, a human risk management platform nominated by RSA Conference as a top ten most innovative startup. SANS and Elevate …
ChaosSearch teams up with Armor to deliver an integrated log analysis solution
ChaosSearch announced that it is teaming with Armor, a leading global cybersecurity software company that protects workloads in public, hybrid and private cloud environments, …
Renault and Google Cloud join forces to accelerate Industry 4.0 transformation
Groupe Renault and Google Cloud announced a new industrial and technology partnership to accelerate the digitization of Groupe Renault’s industrial system and of …
Accenture invests in Synadia and the NATS.io open source project
Accenture has made a strategic investment, through Accenture Ventures, in Synadia Communications, the company behind the production-proven open source NATS.io project which …
Louis Chabot joins Axiologic Solutions as chief technology officer
Axiologic Solutions announced that Louis Chabot has been appointed to the position of chief technology officer. As CTO, Chabot will lead technology research, selection, …
Extreme Networks appoints Nabil Bukhari as Chief Technology Officer
Extreme Networks announced Nabil Bukhari as Chief Technology Officer, in addition to his current role as Chief Product Officer. In his new role as CTO, Nabil will expand on …
Zoom zero-day flaw allows code execution on victim’s Windows machine
A zero-day vulnerability in Zoom for Windows may be exploited by an attacker to execute arbitrary code on a victim’s computer. The attack doesn’t trigger a …
Three major gaps in the Cyberspace Solarium Commission’s report that need to be addressed
Released in March 2020, the Cyberspace Solarium Commission’s report urges for the U.S. government and private sector to adopt a “new, strategic approach to cybersecurity,” …
70% of organizations experienced a public cloud security incident in the last year
70% of organizations experienced a public cloud security incident in the last year – including ransomware and other malware (50%), exposed data (29%), compromised accounts …
In the age of disruption, comprehensive network visibility is key
IT teams require comprehensive visibility into the network driven by a number of factors, including tremendous disruption from the COVID-19 pandemic, relentless technological …
Featured news
Resources
Don't miss
- How AI is reshaping attack path analysis
- What happens when cybersecurity knowledge walks out the door
- AI-driven scams are eroding trust in calls, messages, and meetings
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform