Compliance Scorecard enhances its CaaS platform to improve MSPs’ cybersecurity posture

Compliance Scorecard has unveiled the latest version of its Compliance-as-a Service (CaaS) platform. The updated platform now includes advanced risk management tools, improved asset management capabilities, and new compliance... Read more »

KELA’s TPRM module identifies software supply chain risks

KELA launched the Third-Party Risk Management (TPRM) module, fully integrated into its threat intelligence platform. This new offering is specifically designed to strengthen organizational defenses by focusing on software... Read more »

The number of known Snowflake customer data breaches is rising

LendingTree subsidiary QuoteWizard and automotive parts provider Advance Auto Parts have been revealed as victims of attackers who are trying to sell data stolen from Snowflake-hosted cloud databases. Snowflake... Read more »

DataBee EntityViews accelerates zero trust architecture deployment

DataBee, from Comcast Technology Solutions, announced new capabilities in its DataBee Hive security, risk and compliance data fabric platform. DataBee EntityViews, powered by a patent-pending entity resolution technology, introduces... Read more »

Christie’s data breach impacted 45,798 individuals

Auction house Christie’s revealed that the data breach caused by the recent ransomware attack impacted 45,000 individuals. At the end of May, the auction house Christie’s disclosed a data breach... Read more »

General election 2024: Liberal Democrats thread digital commitments throughout manifesto

Read more »

NHS blood stocks running low after ransomware attack

Read more »

Sticky Werewolf targets the aviation industry in Russia and Belarus

Morphisec researchers observed a threat actor, tracked as Sticky Werewolf, targeting entities in Russia and Belarus. Sticky Werewolf is a threat actor that was first spotted in April 2023,... Read more »

Entrust Citizen Identity Orchestration enhances citizen adoption of digital public services

Entrust launched Citizen Identity Orchestration solution. Governments now can streamline the delivery of public services through secure digital identities, embedding trust in every citizen interaction. The innovative and modular... Read more »

How Your Business Can Benefit from a Network Security Policy

A company’s network must be secured to ensure the safety of its data against the risks of cyberthreats. Read more »
Subscribe to our Newsletter