Globe Telecom acquires Cascadeo Corporation and Cascadeo Partners to expand ICT capabilities
Globe Telecom has entered into an agreement to acquire substantially all of the assets of US-based Cloud Consulting Companies, Cascadeo Corporation and Cascadeo Partners …
MobileIron enters cooperation agreement with Altai Capital Management to accelerate growth
MobileIron, the company that introduced the industry’s first mobile-centric, zero trust platform for the enterprise, announced that it has entered into a cooperation agreement …
BioCatch raises $145M to accelerate growth and expand mission-critical behavioral insights
BioCatch, the global leader in behavioral biometrics, announced it has completed a $145 million Series C investment led by Bain Capital Tech Opportunities, the growth …
Renaud Perrier joins Virtru as Sr VP of International Business Development and Operations
Virtru, the new standard in data protection, announced the appointment of Google’s former Head of Cloud ISV Partnerships, Renaud Perrier, as Senior Vice President of …
Week in review: Cloud migration and cybersecurity, data trending on the dark web, Zoom security
Here’s an overview of some of last week’s most interesting news and articles: What type of data is trending on the dark web? Fraud guides accounted for nearly half …
760+ malicious packages found typosquatting on RubyGems
Researchers have discovered over 760 malicious Ruby packages (aka “gems”) typosquatting on RubyGems, the Ruby community’s gem repository / hosting service. The …
New infosec products of the week: April 17, 2020
NeuVector adds to container security platform, automates end-to-end vulnerability management The platform additions include the new Vulnerability and Compliance Explorer for …
Office printers: The ticking IT time bomb hiding in plain sight
Office printers don’t have to be security threats: with foresight and maintenance they’re very easily threat-proofed. The problem is that system administrators rarely give the …
Surge in remote working reveals concerns around unprotected endpoints
Millions of US businesses forced to rapidly support home working for employees are facing significant challenges to securely manage their IT networks. New research from Tanium …
What type of data is trending on the dark web?
Fraud guides accounted for nearly half (49%) of the data being sold on the dark web, followed by personal data at 15.6%, according to Terbium Labs. Researchers surveyed three …
Researchers develop self-healing and self-concealing PUF for hardware security
A team of researchers from the National University of Singapore (NUS) has developed a novel technique that allows Physically Unclonable Functions (PUFs) to produce more …
Cohesity launches mobile app that enables IT staff manage data from their mobile devices
Cohesity announced a mobile app that gives busy IT staff a simple way to manage all of their Cohesity clusters right from the palm of their hand. The Cohesity Helios mobile …
Featured news
Resources
Don't miss
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices