April 2021
GigaIO releases FabreX 2.2, offering scalability over a PCIe fabric for AI workloads
GigaIO announced FabreX release 2.2, the native PCI Express (PCIe) Gen4 universal dynamic fabric, which supports NVMe-oF, GDR, MPI, and TCP/IP. This new release introduces an …
Mirantis Container Cloud enables businesses to build and operate container and VM clouds anywhere
Mirantis announced Mirantis Container Cloud with hundreds of updates, including support for the IaaS solution VMware, that enables businesses to build and operate container …
FIDO launches protocol to secure IoT onboarding to cloud and on-premise management platforms
The FIDO Alliance announced the launch of the FIDO Device Onboard (FDO) protocol, a new, open IoT standard which will enable devices to simply and securely onboard to cloud …
Mastercard acquires Ekata for $850M to advance its identity verification efforts
Trust is the key ingredient to conducting digital commerce. Central to creating trust in a digital world is the ability to prove your digital identity – who you are, …
Carnegie Mellon University SEI appoints Gregory J. Touhill as director of the CERT Division
Carnegie Mellon University‘s Software Engineering Institute announced the appointment of Gregory J. Touhill as director of the SEI’s CERT Division. A federally …
Bernard A. Harris Jr. joins Raytheon Technologies board of directors
Raytheon Technologies announced that its board of directors has elected Dr. Bernard A. Harris Jr. as a director. A distinguished former NASA astronaut who is currently the …

Facebook Messenger users targeted by a large-scale scam
A large-scale scam campaign targeting Facebook Messenger users all over the world has been detected by Group-IB. Digital Risk Protection (DRP) analysts have found evidence …

Approaching zero trust security strategically
With digital transformation efforts accelerating, the attack surface expanding exponentially and conventional perimeter-based security continuing to fail, there’s never been a …

Product showcase: Accurics
It is no big secret that infrastructure has changed over the last decade. We went from tools such as autossh, to configuration management, and ended up with Infrastructure as …

Consumer data protection is a high priority, but there’s still work to be done
Enterprises see protecting customer personal information as the top reason to encrypt data, and yet report actually encrypting customer data at a far lower rate. This and …

CISO’s guide to automating third-party cyber risk management
With increasing dependence on third parties in today’s interconnected world, vendor security risk assessments are more essential than ever. Failing to do them may result in …

Even though critical, web application security is getting less attention
As organizations shifted focus to support remote work and business continuity amid the challenges of 2020, web application security suffered, according to an Invicti Security …
Featured news
Resources
Don't miss
- How security teams are putting AI to work right now
- Buttercup: Open-source AI-driven system detects and patches vulnerabilities
- Review: Data Engineering for Cybersecurity
- Weak alerting and slipping prevention raise risk levels for CISOs
- How military leadership prepares veterans for cybersecurity success