Apple joins Cyber Readiness Institute as Co-Chair to improve cyber readiness for SMBs
The Cyber Readiness Institute (CRI) welcomed Apple as a Co-Chair of the organization. Apple joins CRI to further our mission to help small and medium-sized businesses (SMBs) …
CDS partners with Post-Quantum to provide post-quantum encryption algorithms for super yachts
A wide range of organizations from defence to banking are preparing for ‘Y2Q’, the moment when a sufficiently developed quantum computer emerges that can break today’s …
Strike Graph raises $8M to expand its offerings of cybersecurity compliances
Strike Graph announces that it has secured $8 million in Series A funding, led by Information Venture Partners, investors in the next generation of leaders in B2B FinTech and …
FileCloud Compliance Center automates data protection across federal agency standards
Over the past few weeks, the federal government has sent clear signals that it’s ready to work with vendors on infrastructure and cybersecurity. In the wake of the Executive …
LS-ISAO establishes Cyber Incident Response Committee to expand threat awareness for law firms
The Legal Services Information Sharing and Analysis Organization (LS-ISAO) has established a new member-led group called the Cyber Incident Response Committee (CIRC) to create …
Cybersecurity is hands-on learning, but everyone must be on the same page
In this interview with Help Net Security, Amanda L. Joyce, Group Leader, Strategic Cybersecurity Analysis & Research, Argonne National Laboratory, offers her unique …
Run with Noblis Solutions Suite drives efficiency, visibility and insight across complex federal processes
Noblis announced the launch of its Run with Noblis Solutions Suite designed to drive new levels of efficiency, visibility and insight across complex federal processes. Paired …
DNAnexus’ biomedical informatics platform exceeds security and compliance requirements
DNAnexus announced that its biomedical informatics platform has achieved readiness and, in many areas, exceeds the full series of online security policy objectives outlined in …
Intrinsic ID partners with DARPA to offer digital authentication and security tech to researchers
Intrinsic ID announced a partnership with the U.S. Defense Advanced Research Projects Agency (DARPA) to make its digital authentication and security technology accessible to …
A look at the 2021 CWE Top 25 most dangerous software weaknesses
The 2021 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses is a demonstrative list of the most common issues experienced over the previous two …
Ivanti Neurons for Zero Trust Access enhances cybersecurity in the everywhere workplace
Ivanti released Ivanti Neurons for Zero Trust Access. Ivanti Neurons for Zero Trust Access helps organizations improve their security posture through a zero trust aligned and …
Infinipoint DIaaS solution offers zero trust security posture for devices
Infinipoint announced a Device-Identity-as-a-Service (DIaaS), its device identity and security posture solution that is part of a zero trust approach to secure device access. …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity