Ivanti fixed two EPMM flaws exploited in limited attacks

Ivanti addressed two Endpoint Manager Mobile (EPMM) software vulnerabilities that have been exploited in limited attacks. Ivanti has released security updates to address two vulnerabilities in Endpoint Manager Mobile (EPMM) software.... Read more »

Scattered Spider retail attacks spreading to US, says Google

Google’s threat intel analysts are aware of a number of in-progress cyber attacks against US retailers linked to the same Scattered Spider gang that supposedly attacked M&S and Co-op... Read more »

Google strengthens secure enterprise access from BYOD Android devices

Google has introduced Device Trust from Android Enterprise, a new solution for making sure that private Android devices used for work are secure enough to access corporate resources and... Read more »

Foxit Smart Redact Server automates the redaction of sensitive data

Foxit launched Smart Redact Server, a new AI-driven platform built to automate the redaction of sensitive data at scale across enterprise environments. Designed for organizations that manage large volumes... Read more »

McAfee’s Scam Detector identifies scams across text, email, and video

McAfee is introducing McAfee’s Scam Detector, a new feature that automatically identifies scams across text, email, and video. Available now in all core McAfee plans at no extra cost,... Read more »

Obsidian’s browser extension manages shadow SaaS and AI tools

Obsidian Security has launched a new browser extension to help businesses safely use SaaS and AI apps online. The extension automatically finds and manages shadow SaaS and AI tools,... Read more »

Enisa launches European vulnerability database

The EU’s new vulnerability database is designed to offer a broader, more transparent source of information on new cyber vulnerabilities Read more »

It’s time to get to grips with DORA

It’s not really a surprise so many organisations missed the EU’s DORE compliance deadline, but there’s no excuse for delaying, says Azul EMEA VP James Johnston Read more »

Why we must reform the Computer Misuse Act: A cyber pro speaks out

Britain’s outdated hacking laws are leaving the UK’s cyber practitioners hamstrung and afraid. Security professional Simon Whittaker reveals how he nearly ran afoul of the Computer Misuse Act, and... Read more »

What is business resilience?

Business resilience is an organization’s ability to adapt quickly to disruptions while maintaining continuous business operations and safeguarding people, assets and overall brand equity. Read more »
Subscribe to our Newsletter