Trilio’s app-centric data protection platform for Kubernetes now available to IBM customers and partners
Trilio announced that its application-centric data protection platform for Kubernetes will be available to IBM customers and partners. IBM clients can leverage IBM Cloud Pak …
InfoSaaS and Axora help oil, gas and mining sectors achieve ISO management system certifications
InfoSaaS and Axora have concluded a partnership agreement intended to transform the processes and costs of achieving and retaining information security, data protection and …
Trend Micro’s hybrid cloud security offerings receive the AWS Outposts Ready designation
Trend Micro announced that its hybrid cloud security offerings have received the AWS Outposts Ready designation, part of the Amazon Web Services (AWS) Service Ready Program. …
Accenture acquires SALT Solutions to build cloud-based industrial IoT platforms
Accenture has agreed to acquire SALT Solutions, a technology consultancy headquartered in Würzburg, Germany. The firm implements and maintains IT systems for production, …
Axio appoints Eric Cardwell as Director of Cyber Risk Engineering
Axio announced the appointment of Eric Cardwell as the company’s Director of Cyber Risk Engineering. Mr. Cardwell will be responsible for addressing cyber risk requirements …
Microsoft open-sources tool that enables continuous developer-driven fuzzing
Microsoft has open-sourced OneFuzz, its own internal continuous developer-driven fuzzing platform, allowing developers around the world to receive fuzz testing results …
How security theater misses critical gaps in attack surface and what to do about it
Bruce Schneier coined the phrase security theater to describe “security measures that make people feel more secure without doing anything to actually improve their security.” …
Do Californians use CCPA to protect their privacy?
Californians regularly opt-out of companies selling their personal information, with “Do-not-sell” being the most common CCPA right exercised, happening nearly 50% of the time …
What are the most vulnerable departments and sectors to phishing attacks?
While cyber attackers chase down system vulnerabilities and valuable data each passing day, the business world has taken the measures against them. The latest trends and …
eCrime campaigns outpace state-sponsored activity in first half of 2020
CrowdStrike has released an annual report that reviews intrusion trends during the first half of 2020 and provides insights into the current landscape of adversary tactics, …
CISOs struggling to prep for security audits
Calendars for security and compliance audits are largely unchanged despite COVID-19, yet the pandemic is straining teams as they work remotely, according to Shujinko. …
Tracking global cybercrime activity and the impact on the digital economy
A LexisNexis Risk Solutions report tracks global cybercrime activity from January 2020 through June 2020. The period has seen strong transaction volume growth compared to 2019 …
Featured news
Resources
Don't miss
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices