NXLog Enterprise Edition 5.1: Providing capabilities to further harden enterprises’ security
NXLog announces the first minor release in the new major version of NXLog Enterprise Edition, NXLog Enterprise Edition version 5.1 (EE 5.1). Even though it is a minor release, …
Druva introduces simplified, enterprise-grade backup and disaster recovery support for Kubernetes
Druva announced beta support for Kubernetes workloads which delivers complete application protection that is accessible by all teams, including the central IT team and DevOps. …
Infosys integrates Qualys VMDR and Multi-Vector EDR into its CyberNext Platform
Qualys announced that Infosys will integrate Qualys VMDR and Multi-Vector EDR into its CyberNext Platform, a managed security service offering. Powered by the Qualys Cloud …
Gigamon and Nokia offer purpose-built joint solution to accelerate 5G adoption
With the number of 5G connections expected to grow from roughly 10 million in 2019 to over 1 billion in 2023, the need to optimize performance is vital to delivering a …
SentinelOne appoints David Bernhardt as CFO
SentinelOne announced the appointment of David Bernhardt as CFO. Drawing upon more than 20 years of SaaS experience in financial operations management of pre- and post-IPO …
Windows backdoor masquerading as VPN app installer
Windows users looking to install a VPN app are in danger of downloading one that’s been bundled with a backdoor, Trend Micro researchers warn. The trojanized package in …
Pradeo Security In-App Protection: Neutralizing clones and fake apps to prevent fraud
Despite being built with various shielding techniques, mobile apps are easily cloned or mimicked. As a result, fraud figures have kept growing since the advent of mobile …
iOS 14: New privacy and security features
Apple has released iOS 14, with a bucketload of new and improved functional features and a handful of privacy and security ones. New privacy and security features in iOS 14 …
DaaS, BYOD, leasing and buying: Which is better for cybersecurity?
In the digital age, staff expect employers to provide hardware, and companies need hardware that allows employees to work efficiently and securely. There are already a number …
Secure data sharing in a world concerned with privacy
The ongoing debate surrounding privacy protection in the global data economy reached a fever pitch with July’s “Schrems II” ruling at the European Court of Justice, which …
Only 44% of healthcare providers conform to protocols outlined by the NIST CSF
Only 44% of healthcare providers, including hospital and health systems, conformed to protocols outlined by the NIST CSF – with scores in some cases trending backwards …
What are the traits of an effective CISO?
Only 12% of CISOs excel in all four categories of the Gartner CISO Effectiveness Index. “Today’s CISOs must demonstrate a higher level of effectiveness than ever before,” said …
Featured news
Resources
Don't miss
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices