Office 365 users: Beware of fake company emails delivering a new VPN configuration
Phishers are impersonating companies’ IT support team and sending fake VPN configuration change notifications in the hopes that remote employees may be tricked into …
Cooking up secure code: A foolproof recipe for open source
The use of open source code in modern software has become nearly ubiquitous. It makes perfect sense: facing ever-increasing pressures to accelerate the rate at which new …
Researchers develop IoT security and privacy label
When hungry consumers want to know how many calories are in a bag of chips, they can check the nutrition label on the bag. When those same consumers want to check the security …
Increased attacks and the power of a fully staffed cybersecurity team
The cybersecurity landscape is constantly evolving, and even more so during this time of disruption. According to ISACA’s survey, most respondents believe that their …
Cybercriminals exposed 5 billion records in 2019, costing U.S. organizations over $1.2 trillion
Cybercriminals exposed over 5 billion records in 2019, costing over $1.2 trillion to U.S. organizations, according to ForgeRock. Coupled with breaches in 2018 costing over …
Global revenue from OCP infrastructure market to reach $33.8 billion in 2024
Worldwide revenue from the Open Compute Project (OCP) infrastructure market will reach $33.8 billion in 2024, according to IDC. While year-over-year growth will slow slightly …
Cloudian HyperIQ: Efficiently managing storage across on-premise and hybrid cloud
Cloudian announced HyperIQ, a monitoring and observability solution for proactively and efficiently managing Cloudian storage and related infrastructure across on-premise and …
Chef’s innovations enable continuous secure app delivery for InfraOps, AppOps and SecOps teams
Chef announced a number of new products designed to enable coded enterprises to work across silos to build competitive advantage through automation. The newly introduced Chef …
Cyemptive Enterprise Scanner 2: Eliminating threats in files before a problem is actually initiated
Cyemptive Technologies, a provider of preemptive cybersecurity products and technology and winner of the Department of Homeland Security’s national competition for most …
By Light and FireEye incorporate threat intelligence into cyberspace attacks
By Light Professional IT Services and the intelligence-led security company, FireEye announced the integration of Mandiant Threat Intelligence within By Light’s …
Privitar and BigID enable enterprises to leverage their data safely and at great speed
Privitar and BigID have partnered to provide organizations with an integrated, automated approach to tackling some of the biggest challenges associated with deriving valuable …
OffsiteDataSync and Zerto make DRaaS easy while ensuring RTOs and RPOs of near zero
OffsiteDataSync is proud to announce the expansion of its partnership with Zerto to become a Gold Level Zerto Alliance Partner. The move further enables OffsiteDataSync to …
Featured news
Resources
Don't miss
- How AI is reshaping attack path analysis
- What happens when cybersecurity knowledge walks out the door
- AI-driven scams are eroding trust in calls, messages, and meetings
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform