Entro Security raises $18 million to scale its global operations

Entro Security announced it has closed an $18 million Series A round, led by Dell Technologies Capital with the participation of seed investors Hyperwise Ventures and StageOne Ventures, as... Read more »

The 5 Best VPNs With Free Trials in 2024

Here are the best VPNs with free trials available today. They offer access to premium VPN features and let you test drive paid VPNs without purchasing a subscription. Read more »

Managing Cloud Security Posture: Continuous Monitoring and Hardening for Visibility and Compliance

Cloud adoption is not slowing down, and neither is the cloud threat landscape. Among many other benefits, the cloud offers increased productivity and flexibility, as well as reduced infrastructural... Read more »

Keytronic confirms data breach after ransomware attack

Printed circuit board assembly (PCBA) manufacturer Keytronic disclosed a data breach after a ransomware attack. Keytronic has confirmed a data breach after a ransomware group leaked allegedly stolen personal... Read more »

SUSE announces Liberty Linux Lite for CentOS 7

SUSE announced a new SUSE Liberty Linux offering to help protect CentOS systems from future vulnerabilities. SUSE Liberty Linux Lite for CentOS 7 is a frictionless solution that provides... Read more »

Critical RCE flaws in vCenter Server fixed (CVE-2024-37079, CVE-2024-37080)

VMware by Broadcom has fixed two critical vulnerabilities (CVE-2024-37079, CVE-2024-37080) affecting VMware vCenter Server and products that contain it: vSphere and Cloud Foundation. “A malicious actor with network access... Read more »

eBook: The Art & Science of Secure Software Development

Software security requires a creative and disciplined approach. It involves having the vision to develop secure strategy, tactics, and execution. Excelling in the discipline demands thinking through the entire... Read more »

Datadog App Builder helps accelerate issue remediation

Datadog launched Datadog App Builder, a low-code development tool that helps teams create self-service applications and integrate them securely into their monitoring stacks. These customized apps help accelerate issue... Read more »

The Financial Dynamics Behind Ransomware Attacks

Over the last few years, ransomware attacks have become one of the most prevalent and expensive forms of cybercrime. Initially, these attacks involved malicious software that encrypts a victim’s... Read more »

How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams

Cybersecurity isn’t just about firewalls and antivirus. It’s about understanding how your defenses, people, and processes work together. Just like Google Maps revolutionized navigation, process mapping can revolutionize how... Read more »
Subscribe to our Newsletter