Intrinsic ID partners with DARPA to offer digital authentication and security tech to researchers
Intrinsic ID announced a partnership with the U.S. Defense Advanced Research Projects Agency (DARPA) to make its digital authentication and security technology accessible to …

A look at the 2021 CWE Top 25 most dangerous software weaknesses
The 2021 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses is a demonstrative list of the most common issues experienced over the previous two …
Ivanti Neurons for Zero Trust Access enhances cybersecurity in the everywhere workplace
Ivanti released Ivanti Neurons for Zero Trust Access. Ivanti Neurons for Zero Trust Access helps organizations improve their security posture through a zero trust aligned and …
Infinipoint DIaaS solution offers zero trust security posture for devices
Infinipoint announced a Device-Identity-as-a-Service (DIaaS), its device identity and security posture solution that is part of a zero trust approach to secure device access. …
NIST selects Ivanti on Implementing A Zero Trust Architecture project
Ivanti announced that it has been selected by the National Institute of Standards and Technology’s (NIST’s) National Cybersecurity Center of Excellence (NCCoE) to participate …
Radiant Logic participates in NIST’s NCCoE Zero Trust Architecture project
Radiant Logic announced that it has been selected by the National Institute of Standards and Technology (NIST)’s National Cybersecurity Center of Excellence (NCCoE) to …
Appgate participates in the implementation of a Zero Trust Architecture project with NCCoE
Appgate announced its participation in the Implementing a Zero Trust Architecture Project with the National Cybersecurity Center of Excellence (NCCoE) at the National …

Manufacturers turning to zero trust to better secure their networks
In response to the 62% global increase in ransomware since 2019 (158% increase in North America) and over 40% of manufacturing firms suffering a cyberattack last year, Onclave …
Ping Identity adds its IAM solutions to the Department of Homeland Security CDM APL
Ping Identity announced two of its Identity and Access Management (IAM) solutions have been added to the Department of Homeland Security (DHS) Continuous Diagnostics and …
Google Cloud’s zero trust offerings help U.S. government organizations guard against cyberthreats
Google Cloud today announced new zero trust offerings for government, a set of services to help U.S. federal, state, and local government organizations implement zero trust …
Haystack Solutions CATA identifies cognitive abilities of individuals entering or upskilling in cybersecurity
Haystack Solutions introduced the Cyber Aptitude and Talent Assessment (CATA). It is the first such commercially available solution that is scientifically designed to identify …
Red Hat renews FIPS 140-2 security validation for Red Hat Enterprise Linux 8.2
Red Hat announced the renewal of the Federal Information Processing Standard 140-2 (FIPS 140-2) security validation for Red Hat Enterprise Linux 8.2. The second FIPS …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains