Kevin Lynch joins Optiv as CEO and member of the Board of Directors
Optiv Security, a security solutions integrator delivering end-to-end cybersecurity solutions, announced that it has named Kevin Lynch as the company’s Chief Executive Officer …
GroupSense names Adam Bregenzer as CTO and Jeffrey Duran as CMO
GroupSense, a digital risk protection company, announced it has named Adam Bregenzer as chief technology officer and Jeffrey Duran as chief marketing officer. Bregenzer will …
Amy Luby joins Acronis as Channel Chief Evangelist
Acronis, a global leader in cyber protection, announced that Amy Luby, a respected veteran in the managed service provider (MSP) and IT channel communities, has joined the …
AttackIQ appoints new CMO and senior director of cybersecurity strategy and policy
AttackIQ, the leading independent vendor of breach and attack simulation solutions, announced the appointments of Julie O’Brien as chief marketing officer (CMO) and …
Jaya Baloo elected to Nixu’s Board of Directors
European cybersecurity company Nixu is pleased to announce that Dutch-American Jaya Baloo has been elected to Nixu Corporation’s Board of Directors by the Annual General …
Coretelligent promotes Guido Timmerman to Chief Revenue Officer
Coretelligent, a leading provider of comprehensive managed IT and private cloud services, announced the promotion of Guido Timmerman to Chief Revenue Officer. Timmerman was …
April 2020 Patch Tuesday: Microsoft fixes three actively exploited vulnerabilities
For the April 2020 Patch Tuesday, Adobe plugs 5 flaws and Microsoft 113, three of which are currently being exploited by attackers. Adobe’s updates On this Patch …
Will Zoom manage to retain security-conscious customers?
While Zoom Video Communications is trying to change the public’s rightful perception that, at least until a few weeks ago, Zoom security and privacy were low on their …
VMware plugs critical flaw in vCenter Server, patch ASAP!
VMware has fixed a critical vulnerability (CVE-2020-3952) affecting vCenter Server, which can be exploited to extract highly sensitive information that could be used to …
The dangers of assumptions in security
Assuming things is bad for your security posture. You are leaving yourself vulnerable when you assume what you have is what you need, or what you have is working as …
GDPR, CCPA and beyond: How synthetic data can reduce the scope of stringent regulations
As many organizations are still discovering, compliance is complicated. Stringent regulations, like the GDPR and the CCPA, require multiple steps from numerous departments …
Shift to work-from-home: Most IT pros worried about cloud security
As most companies make the rapid shift to work-from-home to stem the spread of COVID-19, a significant percentage of IT and cloud professionals are concerned about maintaining …
Featured news
Resources
Don't miss
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices