Strike Graph raises $8M to expand its offerings of cybersecurity compliances
Strike Graph announces that it has secured $8 million in Series A funding, led by Information Venture Partners, investors in the next generation of leaders in B2B FinTech and …
FileCloud Compliance Center automates data protection across federal agency standards
Over the past few weeks, the federal government has sent clear signals that it’s ready to work with vendors on infrastructure and cybersecurity. In the wake of the Executive …
LS-ISAO establishes Cyber Incident Response Committee to expand threat awareness for law firms
The Legal Services Information Sharing and Analysis Organization (LS-ISAO) has established a new member-led group called the Cyber Incident Response Committee (CIRC) to create …

Cybersecurity is hands-on learning, but everyone must be on the same page
In this interview with Help Net Security, Amanda L. Joyce, Group Leader, Strategic Cybersecurity Analysis & Research, Argonne National Laboratory, offers her unique …
Run with Noblis Solutions Suite drives efficiency, visibility and insight across complex federal processes
Noblis announced the launch of its Run with Noblis Solutions Suite designed to drive new levels of efficiency, visibility and insight across complex federal processes. Paired …
DNAnexus’ biomedical informatics platform exceeds security and compliance requirements
DNAnexus announced that its biomedical informatics platform has achieved readiness and, in many areas, exceeds the full series of online security policy objectives outlined in …
Intrinsic ID partners with DARPA to offer digital authentication and security tech to researchers
Intrinsic ID announced a partnership with the U.S. Defense Advanced Research Projects Agency (DARPA) to make its digital authentication and security technology accessible to …

A look at the 2021 CWE Top 25 most dangerous software weaknesses
The 2021 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses is a demonstrative list of the most common issues experienced over the previous two …
Ivanti Neurons for Zero Trust Access enhances cybersecurity in the everywhere workplace
Ivanti released Ivanti Neurons for Zero Trust Access. Ivanti Neurons for Zero Trust Access helps organizations improve their security posture through a zero trust aligned and …
Infinipoint DIaaS solution offers zero trust security posture for devices
Infinipoint announced a Device-Identity-as-a-Service (DIaaS), its device identity and security posture solution that is part of a zero trust approach to secure device access. …
NIST selects Ivanti on Implementing A Zero Trust Architecture project
Ivanti announced that it has been selected by the National Institute of Standards and Technology’s (NIST’s) National Cybersecurity Center of Excellence (NCCoE) to participate …
Radiant Logic participates in NIST’s NCCoE Zero Trust Architecture project
Radiant Logic announced that it has been selected by the National Institute of Standards and Technology (NIST)’s National Cybersecurity Center of Excellence (NCCoE) to …
Featured news
Resources
Don't miss
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems
- Meta open-sources AI tool to automatically classify sensitive documents