Latest release of Red Hat Ansible Automation Platform helps orgs get the most out of automation
Red Hat announced key enhancements to the Ansible Automation portfolio, including the latest version of Red Hat Ansible Automation Platform and new Red Hat Certified Ansible …
Virtium expands StorFly line of industrial-grade SSDs to protect IIoT data in extreme temperatures
Virtium announced expansion of its StorFly line of industrial-grade SSDs, boosting storage capacity in drives that protect critical data in the harsh environments of embedded …
Lightbits Labs LightOS 2.0: Reliable disaggregated storage that performs like local flash
Lightbits Labs launched LightOS 2.0, enabling full cloud-native persistent storage integration for Kubernetes with unprecedented scaling and availability via clustering. With …
3CLogic integrates with Microsoft Teams to improve collaboration between departments
3CLogic announced its latest integration with Microsoft Teams. The combined offering will streamline communication between back-office resources and front-line call center …
Siemens acquires UltraSoC to help customers detect, mitigate and eliminate risks throughout the SoC lifecycle
Siemens has signed an agreement to acquire Cambridge, UK-based UltraSoC Technologies, a provider of instrumentation and analytics solutions that put intelligent monitoring, …
Avaya Collaboration Unit achieves 2020 INTERNET TELEPHONY Product of the Year Award
Avaya Holdings announced that its Avaya Collaboration Unit, a simple to use, all-in-one video meeting solution, has received a 2020 INTERNET TELEPHONY Product of the Year …
Steve Preston joins TrapX Security as vice president of marketing
TrapX Security has announced that industry veteran Steve Preston will be joining the executive team as vice president of marketing. In this role, Preston will apply more than …
Microsoft releases Defender ATP for Android and Linux
Microsoft has added support for Linux and Android to Microsoft Defender ATP, its unified enterprise endpoint security platform. Microsoft Defender Advanced Threat Protection …
Amazon establishes Counterfeit Crimes Unit with dedicated global team
Amazon announced it has established a new Counterfeit Crimes Unit, dedicated to bringing counterfeiters that violate the law and Amazon’s policies by listing counterfeit …
How to establish a threat intelligence program
Instituting an in-house cyber threat intelligence (CTI) program as part of the larger cybersecurity efforts can bring about many positive outcomes: The organization may …
Ransomware perspectives: The shape of things to come
Michael Hamilton, CISO of CI Security, has worked in the information security industry for 30 years. As former CISO for the City of Seattle, he managed information security …
New technique protects consumers from voice spoofing attacks
Researchers from CSIRO’s Data61 have developed a new technique to protect consumers from voice spoofing attacks. Fraudsters can record a person’s voice for voice …