Dynatrace to attain FedRAMP Authorization at a moderate impact level
Software intelligence company Dynatrace, announced it is ‘In Process’ to attain Federal Risk and Authorization Management Program (FedRAMP) Authorization at a moderate impact …
IBM and Turbonomic deliver consistent management of cloud-native applications
IBM, the leader in multicloud management (MCM Cloud Pak) and Turbonomic, the leader in Application Resource Management (ARM), announced a partnership that brings the power of …
Accenture acquires Revolutionary Security to deliver advanced cyber defense management
Accenture has acquired Revolutionary Security, a privately held company specializing in enterprise cybersecurity for information technology (IT) and operational technology …
F5 Networks appoints Sri Shivananda to its Board of Directors
F5 Networks announced the appointment of Sri Shivananda to its Board of Directors. Shivananda brings a strong leadership background to F5’s Board, along with valuable …
Actively exploited MS Exchange flaw present on 80% of exposed servers
Attackers looking to exploit CVE-2020-0688, a critical Microsoft Exchange flaw patched by Microsoft in February 2020, don’t have to look hard to find a server they can …
Avast Secure Browser for Android released, includes a built-in VPN
Avast has released an Android version of Avast Secure Browser to extend its platform support beyond Windows and Mac on desktop to mobile. Avast Secure Browser for Android …
seL4 creates open source foundation to enable more secure computing systems
CSIRO‘s Data61, the digital specialist arm of Australia’s national science agency, announced the creation of the seL4 Foundation, a not-for-profit organization, to …
Cybersecurity during the pandemic: Try these security solutions for free!
In order to help global organizations of all sizes address cybersecurity during the COVID-19 pandemic, a number of vendors provide free (time-limited) access to their …
Radio frequency: An invisible espionage threat to enterprises
You can’t see it, but corporate airspaces are under attack via radio frequencies. Foreign governments, competitors and cyber criminals are all conducting radio-based attacks …
Happy developers more likely to build secure apps
There’s an intrinsic link between developer happiness and application security hygiene, and an alarming level of application breaches, according to Sonatype. For the …
Encryption is finally being used primarily to protect personal data rather than just for compliance
As organizations accelerate digital initiatives such as cloud and the IoT, and data volumes and types continue to rise, IT professionals cite protection of customer personal …
On-demand webinar: Securing your remote workforce
This webinar is no longer available. It’s a fact that a majority of us are working from home right now. It’s also a fact that threat actors are hard at work …
Featured news
Resources
Don't miss
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices