VMware increases visibility, enables compliance and enhances security for containerized applications
VMware unveiled expanded cloud workload protection capabilities to deliver security for containers and Kubernetes. The new solution will help increase visibility, enable …
Encrypted method that measures encounters could slow down or prevent future pandemics
When you bump into someone in the workplace or at your local coffee shop, you might call that an “encounter.” That’s the scientific term for it, too. As part …
FedHIVE secures FedRAMP authorization for its IaaS and PaaS capabilities
FedHIVE announced it became the first small-business provider to secure FedRAMP High Impact Baseline Provisional Authority to Operate (P-ATO) for its …
WitFoo releases Precinct 6.1.5, adding advanced indexing and search algorithms
WitFoo announced the release of version 6.1.5 of its Precinct product. This latest version introduces various new capabilities and features. High speed search The 6.1.5 …
Lack of IT-OT collaboration holding back smart factory security projects
61% of manufacturers have experienced cybersecurity incidents in their smart factories and are struggling to deploy the technology needed to effectively manage cyber risk, …
Shujinko AuditX expands compliance automation to all major clouds and regulatory frameworks
Shujinko announced a major update to AuditX, the system of record for enterprise compliance data. This update significantly broadens the platform’s automated data collection …
Arvind Raman joins Mitel as CISO
Mitel announced the appointment of Arvind Raman as Chief Information Security Officer (CISO). Raman will lead all aspects of the company’s information security strategy, …
Preparing for the Cybersecurity Maturity Model Certification onslaught
For the Defense Industrial Base (DIB), the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) compliance requirement is the hot news topic of 2021. …
Application container market to grow steadily by 2026
The application container market is expected to register a CAGR of 29% over the forecast period 2021 to 2026, according to ResearchAndMarkets. Increasing deployments of …
57% of vulnerabilities in 2020 were classified as critical or high severity
NIST logged more than 18,000 vulnerabilities in 2020, over 10,000 of which were critical or high severity – an all-time high. Redscan’s analysis looks beyond severity scores, …
NIST provides guidance to protect controlled unclassified information
Nations around the world are adding cyberwarfare to their arsenal, employing highly skilled teams to launch attacks against other countries. These adversaries are also called …
Three ways formal methods can scale for software security
Security is not like paint: it can’t just be applied after a system has been completed. Instead, security has to be built into the system design. But how can we know that a …
Featured news
Resources
Don't miss
- Mitel MiCollab zero-day and PoC exploit unveiled
- 8 US telcos compromised, FBI advises Americans to use encrypted communications
- Download: The Ultimate Guide to the CCSP
- Preparing for Q-day: The essential role of cloud migration in securing enterprise data
- How the Shadowserver Foundation helps network defenders with free intelligence feeds