Pondurance receives Registered Provider Organization status from the CMMC-AB
Pondurance announced that it was recently approved as a Registered Provider Organization (RPO) by the Cybersecurity Maturity Model Certification Accreditation Body (CMMC-AB). …
Outseer expands fraud prevention value for customers with identity-centric capabilities
Outseer announced new identity-centric capabilities for Outseer Fraud Manager product offering. The two innovations include: New solution for account enrollment protection: …
Cybernance provides certified audit assessments for advanced cyber security protections
Cybernance announced a major extension of its cyber maturity and risk platform to now include a fully featured audit capability. The Cybernance Platform is based on industry …
Qualys Ransomware Risk Assessment Service helps organizations to proactively combat ransomware attacks
Qualys released its Ransomware Risk Assessment Service to provide companies with visibility into their ransomware exposure and automate the patching and configuration changes …
ADVA aPNT+ platform defends critical network infrastructure from cyber threats
ADVA announced that it has responded to calls from the US Department of Homeland Security (DHS) and National Institute of Standards and Technology (NIST) to protect critical …
Evolving beyond RBAC: Why ABAC is the future
In the advent of a “work anywhere, anytime” environment, enterprises face a rapid expansion of diverse users alongside an influx of applications, devices, APIs and …
Fugue IaC platform empowers cloud teams to eliminate security gaps
Fugue announced Fugue IaC, a unified platform for securing infrastructure as code (IaC) and cloud runtime environments using a single set of policies. Powered by a Unified …
Apple joins Cyber Readiness Institute as Co-Chair to improve cyber readiness for SMBs
The Cyber Readiness Institute (CRI) welcomed Apple as a Co-Chair of the organization. Apple joins CRI to further our mission to help small and medium-sized businesses (SMBs) …
CDS partners with Post-Quantum to provide post-quantum encryption algorithms for super yachts
A wide range of organizations from defence to banking are preparing for ‘Y2Q’, the moment when a sufficiently developed quantum computer emerges that can break today’s …
Strike Graph raises $8M to expand its offerings of cybersecurity compliances
Strike Graph announces that it has secured $8 million in Series A funding, led by Information Venture Partners, investors in the next generation of leaders in B2B FinTech and …
FileCloud Compliance Center automates data protection across federal agency standards
Over the past few weeks, the federal government has sent clear signals that it’s ready to work with vendors on infrastructure and cybersecurity. In the wake of the Executive …
LS-ISAO establishes Cyber Incident Response Committee to expand threat awareness for law firms
The Legal Services Information Sharing and Analysis Organization (LS-ISAO) has established a new member-led group called the Cyber Incident Response Committee (CIRC) to create …
Featured news
Resources
Don't miss
- Strengthening security posture with comprehensive cybersecurity assessments
- Neosync: Open-source data anonymization, synthetic data orchestration
- Update your OpenWrt router! Security issue made supply chain attack possible
- Microsoft: “Hack” this LLM-powered service and get paid
- 8Base hacked port operating company Luka Rijeka