Please turn on your JavaScript for this page to function normally.
HackerOne updates Internet Bug Bounty program to improve the security of open source software

HackerOne announced the next evolution of the Internet Bug Bounty (IBB) program at the company’s annual Security conference. The IBB’s mission is to secure open source by …

IriusRisk expands its Technical Advisory Board with three new members

IriusRisk has added three new members to its Technical Advisory Board to help inform the development of its automated threat modeling platform and address the software …

Melissa Daimler joins Udemy as Chief Learning Officer

Udemy announced that Melissa Daimler has joined the company as Chief Learning Officer where she will support the employee experience through learning and organizational …

McAfee’s online protection service protects information across all online activities

McAfee launched its online protection service providing personalized and unified experiences focused on identity and privacy – the protection areas that matter most to …

Druva introduces curated recovery technology for accelerated ransomware recovery

Druva introduced a curated recovery technology, leveraging intelligent automation, for accelerated ransomware recovery. Adding to Druva’s Accelerated Ransomware Recovery …

Yugabyte Cloud delivers distributed SQL without the operational overhead of managing a database

Yugabyte released Yugabyte Cloud, Yugabyte’s public database-as-a-service offering. Yugabyte Cloud, a fully managed offering of YugabyteDB, combines the power of distributed …

Cyware’s threat intelligence sharing capabilities empower organizations to achieve collective defense

Cyware announced new threat intelligence sharing abilities for industry ISACs and ISAOs and their member organizations. The capabilities are driven by Cyware’s Virtual Cyber …

Zix Secure Large File allows any authorized user to send large attachments via email

Zix launched Secure Large File add on for Zix Email Encryption. The offering allows customers to eliminate the challenge of sending large files securely by facilitating the …

FileCloud 21.2 allows managers and team members to create business workflows without coding

The move to digital processes and tools to improve efficiency and productivity is at the heart of any digital transformation. Processes such as contract reviews, file requests …

D2iQ DKP 2.0 enables customers to power applications across any infrastructure

D2iQ announced version 2.0 of the D2iQ Kubernetes Platform (DKP). DKP 2.0 is underpinned by the adoption of the Cloud Native Computing Foundation Cluster (CNCF) Cluster API …

Stellar Cyber partners with ITSDI to bring attack protection and remediation throughout the Philippines

Stellar Cyber has partnered with ITSDI in the Philippines to bring attack protection and remediation to customers in the region. Stellar Cyber is recognized as the leading …

Senet and Helium expand access to public LoRaWAN network for customers deploying IoT applications

Senet and Helium announced a network roaming integration, broadening access to public LoRaWAN network connectivity for customers deploying IoT applications throughout the …

Don't miss

Cybersecurity news