Apricorn 20TB Aegis Fortress L3 SSD enables secure storage of large amounts of data
Apricorn released 20TB Aegis Fortress L3 SSD. The 20TB Aegis Fortress L3 brings the innovation, speed, security and high performance, with an unprecedented level of storage …

The paradox of post-quantum crypto preparedness
Preparing for post-quantum cryptography (PQC) is a paradox: on the one hand, we don’t know for sure when, or perhaps even if, a large quantum computer will become available …
Entrust partners with Yubico to issue PIV credentials on YubiKeys for U.S. government employees
Entrust announced a partnership with Yubico allowing U.S. federal agencies to issue YubiKey 5 Series and YubiKey 5 FIPS Series with Entrust derived PIV (Personal Identity …

Are your cryptographic keys truly safe? Root of Trust redefined for the cloud era
In the digital world, cryptographic solutions use encryption keys to secure data at rest, data in use, and data in transit. They are responsible for encrypting and decrypting …
Veeam Government Solutions: Backup and protection of government mission-critical data
Veeam Software announced the launch of its new, federal government-focused subsidiary, Veeam Government Solutions. Veeam provides a single platform for modernizing backup, …

Quantum computing is imminent, and enterprises need crypto agility now
Nearly 100 years ago, the first quantum revolution ushered in the technological advances that have made our modern life possible. Advances in quantum physics led to the …
SMART Modular T5PFLC FIPS 140-2 SSDs protects sensitive data against cyberattacks
SMART Modular Technologies announced its T5PFLC FIPS 140-2 SSDs which provide certified authentication, sophisticated encryption, and are available in capacities from 120GB …
Panaseer unveils cyber measurement guidance to help avoid incidents
Panaseer announces guidance on best practice cybersecurity measurements to help avoid incidents. Currently, there is limited industry guidance around the most important …

Keeping pace with evolving code signing baseline requirements
Maintaining code integrity has always been top of mind for today’s development-driven organizations. However, the recent SolarWinds breach was a stark reminder of the …

IT service desks lacking user verification policy, putting businesses at risk
48% of organizations don’t have a user verification policy in place for incoming calls to IT service desks, according to Specops Software. The information was uncovered as …
Pangiam acquires Trueface to provide a safer and more personalized travel experience
Pangiam announced that it has acquired Trueface. Terms of the transaction were not disclosed. This is the second acquisition completed by Pangiam since being formed by AE …
Stacklet Platform delivers frictionless governance that accelerates cloud adoption in large-scale environments
Stacklet announced Stacklet Platform, which allows cloud engineering and security teams to easily understand, codify, and automate cloud governance for a frictionless …
Featured news
Resources
Don't miss
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028