Please turn on your JavaScript for this page to function normally.
GigaIO releases FabreX 2.2, offering scalability over a PCIe fabric for AI workloads

GigaIO announced FabreX release 2.2, the native PCI Express (PCIe) Gen4 universal dynamic fabric, which supports NVMe-oF, GDR, MPI, and TCP/IP. This new release introduces an …

Mirantis Container Cloud enables businesses to build and operate container and VM clouds anywhere

Mirantis announced Mirantis Container Cloud with hundreds of updates, including support for the IaaS solution VMware, that enables businesses to build and operate container …

FIDO launches protocol to secure IoT onboarding to cloud and on-premise management platforms

The FIDO Alliance announced the launch of the FIDO Device Onboard (FDO) protocol, a new, open IoT standard which will enable devices to simply and securely onboard to cloud …

Mastercard acquires Ekata for $850M to advance its identity verification efforts

Trust is the key ingredient to conducting digital commerce. Central to creating trust in a digital world is the ability to prove your digital identity – who you are, …

Carnegie Mellon University SEI appoints Gregory J. Touhill as director of the CERT Division

Carnegie Mellon University‘s Software Engineering Institute announced the appointment of Gregory J. Touhill as director of the SEI’s CERT Division. A federally …

Bernard A. Harris Jr. joins Raytheon Technologies board of directors

Raytheon Technologies announced that its board of directors has elected Dr. Bernard A. Harris Jr. as a director. A distinguished former NASA astronaut who is currently the …

Facebook
Facebook Messenger users targeted by a large-scale scam

A large-scale scam campaign targeting Facebook Messenger users all over the world has been detected by Group-IB. Digital Risk Protection (DRP) analysts have found evidence …

zero
Approaching zero trust security strategically

With digital transformation efforts accelerating, the attack surface expanding exponentially and conventional perimeter-based security continuing to fail, there’s never been a …

Accurics
Product showcase: Accurics

It is no big secret that infrastructure has changed over the last decade. We went from tools such as autossh, to configuration management, and ended up with Infrastructure as …

lock
Consumer data protection is a high priority, but there’s still work to be done

Enterprises see protecting customer personal information as the top reason to encrypt data, and yet report actually encrypting customer data at a far lower rate. This and …

Panorays guide
CISO’s guide to automating third-party cyber risk management

With increasing dependence on third parties in today’s interconnected world, vendor security risk assessments are more essential than ever. Failing to do them may result in …

vulnerability
Even though critical, web application security is getting less attention

As organizations shifted focus to support remote work and business continuity amid the challenges of 2020, web application security suffered, according to an Invicti Security …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools