
Popular business web apps fail to implement critical password requirements
Specops Software released new research finding cybersecurity weaknesses in business web apps including Shopify, Zendesk, Trello, and Stack Overflow. Amid a wave of …

Transcend integrates with Zendesk to automate privacy requests by orchestrating customer data
Transcend announces its integration with Zendesk, the global customer service platform. For many companies, the day-to-day privacy operations of fulfilling data and deletion …

Major tech firms launch Security First Initiative to combat third-party data breaches
On the heels of one of the worst years for third-party security incidents in history, top technology firms are joining together to address the increased importance of …
AppOmni’s platform protects companies against cloud and SaaS breaches
From ransomware to data breaches, global cybersecurity incidents against organizations, governments, and individuals are on the rise. There have been a multitude of attacks …
Zoho BI Platform empowers businesses with AI-driven analytics and real-time insights
Zoho announced its new Business Intelligence (BI) Platform — an AI-driven data analytics solution empowering businesses to surface precise and actionable insights through …
Zendesk Explore Enterprise enables companies to analyze real-time data to understand changing needs
Zendesk announced the launch of Explore Enterprise, the newest solution within its service-first CRM platform, which enables companies to analyze real-time data in order to …
Adrian McDermott joins FireEye board of directors
FireEye, the intelligence-led security company, announced that Adrian McDermott has been appointed to the FireEye board of directors. McDermott is currently President of …
Featured news
Resources
Don't miss
- The hidden risk in SaaS: Why companies need a digital identity exit strategy
- Critical Veeam Backup & Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120)
- RansomHub affiliate leverages multi-function Betruger backdoor
- Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates
- 5 pitfalls that can delay cyber incident response and recovery