Taqtile Manifest 2.0: Optimized communication and increased collaboration between remote workers
Taqtile, the leading provider of enterprise software for industrial workers, announces the 2.0 release of their flagship product Manifest. Manifest is an end-to-end spatial …
Zimperium enhances its offering with ZecOps’ advanced mobile forensics capabilities
Zimperium, the global leader in mobile security, announced a strategic partnership with ZecOps, the leading agentless automated Digital Forensics and Incident Response (DFIR) …
Code42 and Palo Alto Networks Cortex XSOAR manage data risk beyond the corporate network
Code42, the leader in insider threat detection, investigation and response, is now integrated with Palo Alto Networks Cortex XSOAR (previously Demisto), the industry’s first …
Entrust Datacard joins the PTC Partner Network, ioTrust achieves ThingWorx Ready status
Entrust Datacard, a leading provider of trusted identity and secure issuance technology solutions, announced that it has joined the PTC Partner Network. Entrust Datacard also …
Avnet launches XRF16 system-on-module for applications that leverage 5G connectivity
Leading global technology solutions provider Avnet announced the availability of the Avnet XRF16 system-on-module, featuring the Xilinx Zynq UltraScale+ Radio Frequency (RF) …
Adult live streaming site CAM4 found leaking data of millions of users
A misconfigured database containing 7 terabytes of sensitive user and company information related to adult live streaming site CAM4 has been found leaking data. The database …
Nearly a million WordPress sites targeted in extensive attacks
A threat actor is actively trying to insert a backdoor into and compromise WordPress-based sites to redirect visitors to malvertising. “While our records show that this …
Microsoft announces limited Azure Sphere bug bounty program
Microsoft has announced a new security research / bug bounty program aimed at testing and improving the security of Azure Sphere, its comprehensive IoT security solution. The …
Helping healthcare combat cyber attackers
Hospitals and other healthcare organizations around the globe are under immense pressure as they test and care for patients with COVID-19. They are also under siege by cyber …
Future of work: Delivering a modern workspace
We are all painfully aware how the current climate of lockdown and working from home has focused the conversations within the technology community regarding the pros and cons …
Password psychology: People aren’t protecting themselves even though they know better
People aren’t protecting themselves from cybersecurity risks even though they know they should, a study on password psychology by LogMeIn reveals. Password psychology Year …
Is your smartphone pushing you to overshare?
The device people use to communicate online – a smartphone, desktop, or tablet – can affect the extent to which they are willing to overshare intimate or personal …
Featured news
Resources
Don't miss
- Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
- European Commission hit by cyberattackers targeting mobile management platform
- BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation