Stairwell secures $4.5M to help security teams defend against the most sophisticated threats
Stairwell announced $4.5 million in seed investment led by Accel with participation from Sequoia Capital, Gradient Ventures, Allen & Company LLC and other angel …
Cymatic names Stuart McClure to its advisory board
Cymatic announced that Stuart McClure, founder and former chief executive of AI security firm Cylance, has been named to the Cymatic advisory board. Stuart’s security and …
Report: The need for pervasive email security
As the number one threat vector for most organizations, email continues to be widely used by cybercriminals to penetrate organizations in support of a wide variety of …
Healthcare network security is slowly improving
Healthcare delivery organizations (HDOs) have been busy increasing their network and systems security in the last year, though there is still much room for improvement, …
How to apply data protection best practices to the 2020 presidential election
It’s safe to assume that we need to protect presidential election data, since it’s one of the most critical sets of information available. Not only does it ensure the …
76% of applications have at least one security flaw
The majority of applications contain at least one security flaw and fixing those flaws typically takes months, a Veracode report reveals. This year’s analysis of 130,000 …
How important are vulnerability management investments for a cybersecurity posture?
Vulnerability management (VM) technology addresses the threat landscape, which is in a constant state of flux. The wider dispersal of endpoints across private and public cloud …
As offices emptied and remote work became the norm, security teams struggled
One Identity released a global survey that reveals attitudes of IT and security teams regarding their responses to COVID-19-driven work environment changes. The results shed …
Attacks on IoT devices continue to escalate
Attacks on IoT devices continue to rise at an alarming rate due to poor security protections and cybercriminals use of automated tools to exploit these vulnerabilities, …
GrammaTech CodeSentry: Identifying security blind spots in third party code
GrammaTech announced CodeSentry, which performs binary software composition analysis (SCA) to inventory third party code used in custom developed applications and detect …
Cyemptive Technologies cautions of limitations of AI for cyber protection, provides solution
Cyemptive Technologies cautioned entities to recognize the limitations of relying solely on detection based Artificial Intelligence (AI) for cyber protection and outlines the …
Citrix expands its Citrix Ready Workspace Security Program to include zero trust solutions
Work today is happening everywhere on everything from corporate issued laptops and mobile devices to personal tablets and even smartwatches. While this new-found freedom has …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month