September 2023

Attackers use fallback ransomware if LockBit gets blocked
Your security solutions might stave off a LockBit infection, but you might still end up with encrypted files: according to Symantec’s threat researchers, some affiliates …

SecurityScorecard and Measured Analytics and Insurance strengthen proactive cybersecurity strategies
SecurityScorecard announced an alliance with Measured Analytics and Insurance, the AI-powered cyber insurance provider. The initiative delivers a cyber insurance premium …

Access control in cloud-native applications in multi-location environments (NIST SP 800-207)
NIST released Special Publication (SP) 800-207A – “A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location …

Librem 11 tablet sets new standard for privacy and security with Linux-based PureOS
Purism introduced the new Librem 11 tablet running secure PureBoot and Linux kernel-based PureOS. Librem 11 is made for individuals, organizations, government agencies, law …

Great security training is a real challenge
All employees need security training, yet it’s generally a resented afterthought. A variety of studies over years show that human error is generally felt to be the largest …

The critical role of authorization in safeguarding financial institutions
According to a recent Cost of Data Breach report, the financial industry has the second highest average cost for a data breach, making the value well worth financial …

Mobile Verification Toolkit: Forensic analysis of Android and iOS devices to identify compromise
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of …

Download: Ultimate guide to Certified in Cybersecurity
The ultimate guide covers everything you need to know about the entry-level Certified in Cybersecurity certification and how to get started with FREE training and exam through …

CISO Global Threat Informed captures and analyzes data posted to darknets
CISO Global is expanding its capabilities by deepening its threat intelligence feed and incorporating it into existing services. Named ‘Threat Informed’, this new …

SentinelOne releases Singularity RemoteOps Forensics to improve incident response for companies
Cyber breaches are on the rise, and when it comes to responding to them, time is of the essence. In order to drive swift conclusions, security teams need to identify relevant …

Torii launches generative AI-powered SaaS Management Platform
Torii has introduced its next generation SaaS Management Platform (SMP), featuring a series of product releases that set a new standard for innovation and extensibility in …

Armis Centrix delivers a modular approach to cyber exposure management
Armis has launched Armis Centrix, the AI-powered cyber exposure management platform. Armis Centrix is a seamless, frictionless, cloud-based platform that proactively secures …
Featured news
Resources
Don't miss
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders