AttackIQ promotes Stacey Meyer to vice president of federal operations
AttackIQ, the leading independent vendor of breach and attack simulation solutions, announced the promotion of Stacey Meyer to vice president of federal operations. “Stacey …
James W. Sample joins Xcel Energy as vice president, Chief Security Officer
Xcel Energy announced that James W. Sample will join the company as Vice President, Chief Security Officer. Sample will lead the company’s security risk management program, …
Software AG appoints Dr. Matthias Heiden as its new Chief Financial Officer
Software AG announced the appointment of Dr. Matthias Heiden as its new Chief Financial Officer (CFO). Dr. Heiden will be taking over from Arnd Zinnhardt, who will step down …
iPipeline names Daphne Thomas as Chief Operating Officer
iPipeline – a leading provider of cloud-based software solutions for the life insurance and financial services industry – announced the appointment of Daphne Thomas to the …
High-risk Google account owners can now use their iPhone as a security key
Google users who opt for the Advanced Protection Program (APP) to secure their accounts are now able to use their iPhone as a security key. About Google’s Advanced Protection …
Kubernetes bug bounty program open to anyone, rewards up to $10,000
The Cloud Native Computing Foundation is inviting bug hunters to search for and report vulnerabilities affecting Kubernetes. Offered bug bounties range between $100 to …
Companies increasingly reporting attacks attributed to foreign governments
More than one in four security managers attribute attacks against their organization to cyberwarfare or nation-state activity, according to Radware. Nation-state intrusions …
Cyber attackers turn to business disruption as primary attack objective
Over the course of 2019, 36% of the incidents that CrowdStrike investigated were most often caused by ransomware, destructive malware or denial of service attacks, revealing …
Budgetary, policy, workforce issues influencing DOD and intelligence community IT priorities
Information Technology spending by Department of Defense (DOD) and Intelligence Community (IC) agencies will continue to grow as they work to keep pace with the evolution of …
Masergy Shadow IT Discovery: Automatically identify unauthorized SaaS applications
Masergy launched its Masergy Shadow IT Discovery solution. Shadow IT Discovery exposes enterprises to significant cybersecurity risks. Building on its mission to make security …
Cynerio offers hospitals free Windows 7 risk assessment
To prepare for the transition into Windows 7 End of Life, Cynerio is offering hospitals a complementary risk assessment until February 14, 2020. Connected medical devices are …
STEALTHbits StealthINTERCEPT 7.0 strengthens enterprise passwords and AD security
STEALTHbits released StealthINTERCEPT 7.0, their real-time Active Directory (AD) policy enforcement solution that audits and blocks unwanted and unauthorized changes, …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month