Avaya and RingCentral simplify communication and collaboration through multiple channels
Avaya Holdings, a global leader in solutions to enhance and simplify communications and collaboration, and RingCentral, a leading provider of global enterprise cloud …
TRIMEDX partners with CyberVista to launch a cybersecurity training program
TRIMEDX is pleased to announce a comprehensive cybersecurity training program specifically designed to address the ever-growing threat of cyberattacks on connected medical …
Miller Kaplan acquires Citadel to offer clients information security analyses and expertise
Miller Kaplan, a top-100 certified public accounting firm, is pleased to announce that effective January 1, 2020, the firm has acquired Citadel Information Group – a Los …
LexisNexis Risk Solutions enhances its fraud and identity offering with the acquisition of Emailage
LexisNexis Risk Solutions, part of RELX, announced it has entered into an agreement to acquire Emailage, a global provider of fraud prevention and risk management solutions. …
Deepak Ahuja joins NetApp’s Board of Directors
NetApp announced that Deepak Ahuja, CFO of Verily, has joined its Board of Directors. Mr. Ahuja’s appointment brings the number of directors on the NetApp board to eight, …
Aliaswire names Jed Rice as CEO
Aliaswire, a leader in innovative cloud-based payments technology, announced that Jed Rice has been named CEO and been appointed to its Board of Directors, effective January …
Network Data Systems promotes Wayne Dumas to COO and Craig Johnson to VP of Worldwide Sales
Network Data Systems (NDS), an industry leader in IT infrastructure service solutions, is excited to announce the recent promotions of Wayne Dumas to COO and Craig Johnson to …
Elastic App Search: Complete search solution with relevance tuning and analytics built in
Elastic, the company behind Elasticsearch and the Elastic Stack, announced the general availability of Elastic App Search on Elasticsearch Service. Elastic App Search is a …
New ransomware targets industrial control systems
With the ransomware threat is surging unstoppably in the last few years, it was just a matter of time until ICS-specific ransomware became a reality. Researchers from various …
State-sponsored actors may have abused Twitter API to de-anonymize users
A Twitter API that’s intended to help new account holders find people they may already know on Twitter has been abused by known and unknown actors to tie usernames to …
How CISOs can justify cybersecurity purchases
Sometimes a disaster strikes: ransomware encrypts critical files, adversaries steal sensitive data, a business application is compromised with a backdoor… This is the stuff …
What makes some organizations more cyber resilient than others?
Despite higher levels of investment in advanced cybersecurity technologies over the past three years, less than one-fifth of organizations are effectively stopping …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month