Sysdig supports five AWS services to make it easier to use Prometheus with Amazon CloudWatch
Sysdig, a secure DevOps leader, announced support for five Amazon Web Service (AWS) services to make it easier to use Prometheus with Amazon CloudWatch. Sysdig added support …
VMware and Dell deliver simple, secure, and scalable cloud infrastructure to the data center and edge
VMware announced the availability of the second generation of VMware Cloud on Dell EMC, a cloud service that combines the simplicity and agility of the public cloud with the …
Cymatic announces first year customer milestones
Cymatic released data marking its first year of successful customer engagements since its debut in 2019. Cymatic’s next-generation all-in-one web application defense platform, …
Open Systems acquires Born in the Cloud to boost its cybersecurity capabilities
Open Systems, a secure access service edge (SASE) pioneer supporting enterprises in their digital transformation journey, announced its acquisition of Born in the Cloud, a …
Veritas Technologies expands roles for two of its senior executives
Veritas Technologies, a global leader in data protection and availability, announced new and expanded roles for two of its senior executives. Phil Brace has been named …
Shift Technology appoints Donald Matejko as Chief Revenue Officer
Shift Technology, a provider of AI-native fraud detection and claims automation solutions, announced Donald Matejko has joined the company as Chief Revenue Officer (CRO). In …
Signal fixes location-revealing flaw, introduces Signal PINs
Signal has fixed a vulnerability affecting its popular eponymous secure communications app that allowed bad actors to discover and track a user’s location. The non …
Beware of phishing emails urging for a LogMeIn security update
LogMeIn users are being targeted with fake security update requests, which lead to a spoofed phishing page. “Should recipients fall victim to this attack, their login …
The missing link in your SOC: Secure the mainframe
How confident are you that your security visibility covers every critical corner of your infrastructure? A good SIEM solution will pull data across firewalls, servers, …
What do IGA solutions have in common with listening to music anywhere?
Fifteen years ago, there was a revolution in personal music players. The market had slowly evolved from the Walkman to the Discman, when a bolt of innovation brought the MP3 …
How secure are open source libraries?
Seven in 10 applications have a security flaw in an open source library, highlighting how use of open source can introduce flaws, increase risk, and add to security debt, a …
Only 36% of critical infrastructures have a high level of cyber resilience
Greenbone Networks revealed the findings of a research assessing critical infrastructure providers’ ability to operate during or in the wake of a cyberattack. The cyber …
Featured news
Resources
Don't miss
- What happens when cybersecurity knowledge walks out the door
- AI-driven scams are eroding trust in calls, messages, and meetings
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform
- BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)