Please turn on your JavaScript for this page to function normally.
Code42 Incydr and Okta Identity Cloud integration improve organizations’ data security risk postures

Code42 announced it has integrated its Incydr data risk detection and response product with Okta Identity Cloud. The integration combines Code42’s data-centric strategy to …

Cofense acquires Cyberfish to eliminate the need for legacy email security solutions

Cofense announced the acquisition of Cyberfish, provider of next-generation phishing protection powered by Computer Vision and advanced Machine Learning (ML) technology. By …

Venafi surpasses $100M in annual recurring revenue

Venafi announced that the company has surpassed $100 million in annual recurring revenue (ARR), cementing its leadership as category creator. This news comes on the heels of …

Christy Lynch joins deepwatch as CMO

deepwatch announced the appointment of Christy Lynch as chief marketing officer (CMO). Lynch will report to deepwatch CEO Charlie Thomas, and be responsible for the structure, …

SAP
SAP applications are getting compromised by skilled attackers

Newly provisioned, unprotected SAP applications in cloud environments are getting discovered and compromised in mere hours, Onapsis researchers have found, and vulnerabilities …

industrial
Vulnerabilities in ICS-specific backup solution open industrial facilities to attack

Claroty researchers have found and privately disclosed nine vulnerabilities affecting Rockwell Automation’s FactoryTalk AssetCentre, an ICS-specific backup solution. All of …

attacks
How do I select an attack detection solution for my business?

Around the world, organizations are facing a tremendous increase in cyber risk. A recent research reveals that 31% of companies now experience a cyberattack at least once a …

SASE
SASE or zero trust? Why security teams should be using both

As companies continue to navigate increasingly distributed environments, the question of zero trust is coming up more and more – as is the relationship between this …

identity theft
People are the weakest link in data breaches, but can they be held accountable?

In the people-process-technology triad, human error is the top reason for breaches, accounting for 70% of successful attacks, a Cyberinc survey reveals. The next biggest cause …

malware
Massive increase in endpoint attacks, rising rate of encrypted malware and new exploits targeting IoT

Fileless malware and cryptominer attack rates grew by nearly 900% and 25% respectively, while unique ransomware payloads plummeted by 48% in 2020 compared to 2019, according …

esignature
Not all eSignature solutions are necessarily right for business

The popularity of eSignature solutions has skyrocketed in the last year, as part of companies’ digital transformation efforts in the COVID-19 environment. However, not all …

money
IT security budgets to increase over the next 12 months

IT security budgets are spiralling out of control as organizations adapt to the everywhere workplace, an Ivanti survey reveals. 92% of CISOs highlighted the need to deploy …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools