Exabeam SMP enhancements help orgs defend against threats to cloud-based data
Exabeam announced a major enhancement to the Exabeam Security Management Platform (SMP), enabling organizations to detect improper access of cloud storage objects and defend …
Protegrity supports Amazon Redshift to provide advanced data protection
Protegrity announced support for Amazon Redshift, a fully-managed petabyte scale cloud data warehouse. Organizations with high data-security and IT requirements can now deploy …
Windstream Enterprise adds Google Assistant and Amazon Alexa to its SD-WAN solution
Windstream Enterprise (WE) has added new Google Assistant and Amazon Alexa voice command features to its SD-WAN solution, enabling network administrators to work more …
Amazon introduces eero Pro 6 and eero 6, delivering Wi-Fi 6 performance
Amazon introduced the newest additions to the eero family—eero Pro 6 and eero 6. These all-new mesh wifi systems feature Wi-Fi 6, the latest technology delivering faster …
CloudPassage migrates fully-containerized microservices architecture to Amazon EKS
CloudPassage announced that it has migrated the fully-containerized microservices architecture of its Halo cloud security and compliance platform to the fully-managed …
Zoom for Home expands to smart displays, integrates with Facebook, Amazon and Google
Zoom announced that Zoom for Home is expanding to smart displays including Amazon Echo Show, Portal from Facebook, and Google Nest Hub Max, bringing Zoom to widely-used …

Amazon establishes Counterfeit Crimes Unit with dedicated global team
Amazon announced it has established a new Counterfeit Crimes Unit, dedicated to bringing counterfeiters that violate the law and Amazon’s policies by listing counterfeit …

New technique protects consumers from voice spoofing attacks
Researchers from CSIRO’s Data61 have developed a new technique to protect consumers from voice spoofing attacks. Fraudsters can record a person’s voice for voice …

Would you trust Amazon Alexa more if given the option to adjust privacy settings?
Giving users of smart assistants the option to adjust settings for privacy or content delivery, or both, doesn’t necessarily increase their trust in the platform, …

Vulnerability allows attackers to register malicious lookalikes of legitimate web domains
Cybercriminals were able to register malicious generic top-level domains (gTLDs) and subdomains imitating legitimate, prominent sites due to Verisign and several IaaS services …

The 25 most impersonated brands in phishing attacks
PayPal remains the top brand impersonated in phishing attacks for the second quarter in a row, with Facebook taking the #2 spot and Microsoft coming in third, according to …
Amazon, Apple, Google and Zigbee Alliance to develop a royalty-free connectivity standard
Amazon, Apple, Google, and the Zigbee Alliance, announced a new working group that plans to develop and promote the adoption of a new, royalty-free connectivity standard to …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)