Gigamon and Cisco partner to simplify network security
Gigamon announced the integration of Gigamon ThreatINSIGHT and Cisco SecureX to optimize network security through accelerated threat detection and response (NDR). With an …
ThreatConnect acquires Nehemiah Security
ThreatConnect announces the acquisition of Nehemiah Security, a pioneer in the rapidly growing Cyber Risk Quantification (CRQ) space. On August 18, 2020, ThreatConnect through …
Vulnerabilities discovered in PAN-OS, which powers Palo Alto Networks’ firewalls
Palo Alto Networks remediated vulnerabilities in PAN-OS (operating systems version 8.1 or later). Attackers can use these vulnerabilities to gain access to sensitive data or …
How can the C-suite support CISOs in improving cybersecurity?
Among the individuals charged with protecting and improving a company’s cybersecurity, the CISO is typically seen as the executive for the job. That said, the shift to …
Plan for change but don’t leave security behind
COVID-19 has upended the way we do all things. In this interview, Mike Bursell, Chief Security Architect at Red Hat, shares his view of which IT security changes are ongoing …
Developing a plan for remote work security? Here are 6 key considerations
With so many organizations switching to a work-from-home model, many are finding security to be increasingly more difficult to administer and maintain. There is an influx of …
Nine out of ten IT pros have experienced a data breach
Exonar, has today published research revealing that 94 percent of IT pros have experienced a data breach, and an overwhelming majority (79 percent) are worried that their …
Most dev and IT practitioners work extra hours resolving incidents
PagerDuty released a new worldwide study highlighting that more than 80% of organizations have experienced a significant increase in pressure on digital services since the …
Trend Micro’s XDR offerings simplify and optimize detection and response
Trend Micro announced Worry-Free XDR: a new version of its XDR platform designed to extend the power of correlated detection and response beyond the endpoint for smaller …
CrowdStrike enhances services for AWS
CrowdStrike announced the expansion of support for Amazon Web Services (AWS) with new capabilities that deliver integrations for the compute services and cloud services …
(ISC)² 2020 Security Congress to feature nearly 50 hours of expert-led sessions
(ISC)² revealed the expert-led breakout session agenda for its 10th annual Security Congress, which will take place virtually November 16-18. The renowned three-day …
MemSQL scalable SQL database now available on Red Hat Marketplace
The MemSQL scalable SQL database is now available through Red Hat Marketplace. Red Hat Marketplace is an open cloud marketplace for enterprise customers to discover, try, …
Featured news
Resources
Don't miss
- United Airlines CISO on building resilience when disruption is inevitable
- Allama: Open-source AI security automation
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices