Three API security risks in the wake of the Facebook breach
Facebook recently pledged to improve its security following a lawsuit that resulted from a 2018 data breach. The breach, which was left open for more than 20 months, resulted …
Take your SOC to the next level of effectiveness
Enterprise security infrastructures average 80 security products, creating security sprawl and a big management challenge for SOC teams. With high volumes of data generated …
SecOps teams face challenges in understanding how security tools work
Security professionals are overconfident in their tools with 50% reporting that they have experienced a security breach because one or more of their security products was not …
Researchers design a tool to identify the source of errors caused by software updates
We’ve all shared the frustration when it comes to errors – software updates that are intended to make our applications run faster inadvertently end up doing just …
Key technology trends that will redefine businesses over the next three years
To compete and succeed in a world where digital is everywhere, companies need a new focus on balancing “value” with “values,” aligning their drive to create business value …
Veracode Static Analysis: Comprehensive analysis across the development lifecycle
Veracode, the largest independent global provider of application security testing (AST) solutions, announced the launch of the next-generation of Veracode Static Analysis. The …
A10 Networks vThunder TPS: Providing 100 Gbps throughput in a single virtual appliance
A10 Networks announced it has delivered the industry’s highest-performance virtual DDoS defense solution with its software version of the Thunder Threat Protection System …
CyberArk lauches new program to help customers reduce privilege-related risk
CyberArk, the global leader in privileged access management, announced the CyberArk Blueprint for Privileged Access Management Success. The most comprehensive program of its …
HCC Embedded adds MISRA-compliant TLS 1.3 module to its TCP/IP stack
Building on a history of delivering high-quality embedded software components, HCC Embedded (HCC) has added a fully MISRA-compliant TLS (Transport Layer Security) 1.3 module …
Spirent enhances its data breach assessment solution with network security attack exposure capabilities
Spirent Communications, the trusted provider of test, measurement, assurance, and analytics solutions for next-generation devices and networks, announced a major new release …
Gurucul Risk Analytics platform automates threat detection and response for MITRE ATT&CK Framework
Gurucul, a leader in unified security and risk analytics technology for on-premises and the cloud, announced the Gurucul Risk Analytics (GRA) platform has added and aligned …
Richard Stiennon publishes Security Yearbook 2020, covers the history of the IT security industry
Author, industry analyst, and founder of IT-Harvest, Richard Stiennon, announced the release of “Security Yearbook 2020: A History and Directory of the IT Security Industry.” …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month