April 2021

Transitioning to a SASE architecture
There are several key points when contemplating a change in your security architecture. First, and foremost, there is still a security perimeter. The perimeter, however, is …

New infosec products of the week: April 23, 2021
HID Global WorkforceID Authentication manages digital and physical identity credentials HID Global announced the general availability of WorkforceID Authentication, the latest …

What IT leaders are prioritizing in network security investments?
Distinct priorities have emerged when it comes to responding to the needs of IT security’s rapid transformation, a Pulse Media research has found. The survey of 239 …

COVID-19 creates a boom in biometric adoption
Goode Intelligence published a survey which captured the views and opinions of companies that have deployed or are thinking of deploying biometrics. COVID-19 has accelerated …

Trends and technologies that are helping supply chains respond, recover and thrive during pandemic
Nearly half of supply chain leaders surveyed have dramatically accelerated spending on digital technologies to make their operations more responsive and forward-looking during …

Remote work increasing the growth rate of the EDR market
Malware and virus attacks have increased substantially over the years. With the evolution of modern technologies, the threats associated with them have also increased. But on …
Zerto data protection offers backup and disaster recovery for hybrid and native AWS deployments
Zerto announced new data protection solutions for Amazon Web Services (AWS) workloads. From backup and disaster recovery (DR) for Amazon Elastic Kubernetes Services (Amazon …
Varada helps security teams deliver faster time-to-insights on exabytes of data directly on the data lake
Varada announced a new capability of its flagship platform designed to help cybersecurity teams deliver faster time-to-insights on exabytes of data directly on the data lake. …
IBM Watson helps businesses develop trustworthy AI and mitigate risk
IBM announced new capabilities for IBM Watson designed to help businesses build trustworthy AI. These capabilities further expand Watson tools designed to help businesses …
Options empowers Murex MX.3 through its enterprise-grade SaaS-enabled managed apps platform
Options, a long-term Murex partner, empowers MX.3 through its highly secure SaaS-enabled managed apps platform. Murex, the global leader in trading, risk management and …

Critical infrastructure implications of the Pulse Secure multi-factor authentication bypass
The FireEye Mandiant team has discovered multiple threat actors exploiting a zero-day vulnerability in Pulse Secure VPN appliances. The attack infrastructure is very …

Monero-mining botnet targets orgs through recent MS Exchange vulnerabilities
The recent Microsoft Exchange Server vulnerabilities might have initially been exploited by a government-backed APT group, but cybercriminals soon followed suit, using them to …
Featured news
Resources
Don't miss
- How security teams are putting AI to work right now
- Buttercup: Open-source AI-driven system detects and patches vulnerabilities
- Review: Data Engineering for Cybersecurity
- Weak alerting and slipping prevention raise risk levels for CISOs
- How military leadership prepares veterans for cybersecurity success