Onapsis’ product updates strengthen business application security

At RSA Conference 2022, Onapsis announced enhanced information security solutions for its Assess and Defend products. Building on the momentum from the Assess Baseline launch, Onapsis is extending the... Read more »

Intruder dwell time jumps 36%

Sophos released the Active Adversary Playbook 2022, detailing attacker behaviors that Sophos’ Rapid Response team saw in the wild in 2021. The findings show a 36% increase in dwell... Read more »

SafeBreach Studio enables security teams to automate and scale red-team exercises

At RSA Conference 2022, SafeBreach announced SafeBreach Studio, a no-code red-team automation platform security teams of all skill levels can use to create, customize and execute sophisticated attack scenarios... Read more »

Forcepoint unveils new solutions to simplify connectivity and network security for enterprises

Forcepoint is advancing its strategy to simplify security by previewing a new security insights visualization tool, code-named Forcepoint ‘Symphony’, and new Forcepoint FlexEdge family of Secure SD-WAN solutions at... Read more »

82% of CIOs believe their software supply chains are vulnerable

The shift to cloud native development, along with the increased speed in development brought about by the adoption of DevOps processes, has made the challenges connected with securing software... Read more »

Acronis Advanced DLP protects businesses and MSPs from data leakage

Acronis debuted a new Advanced Data Loss Prevention (DLP) pack for Acronis Cyber Protect Cloud, a game-changing solution that shields managed service providers (MSPs) and businesses of all sizes... Read more »

Arctic Wolf announces cyber insurance readiness tool to help organizations manage their security posture

At RSA Conference 2022, Arctic Wolf released enhanced tools and programs advancing Tetra Defense’s MyCyber platform, designed to help businesses more effectively build business resilience as well as address... Read more »

Ransomware attacks keeping the educational sector on its toes

Financially motivated cybercriminals are taking advantage of schools’ need for uptime, their scarcity of cybersecurity defense resources, and lack of expertise compared to other potential targets. In fact, during... Read more »

Recovery and resilience: CISO insights into the 2022 cybersecurity landscape

I recently had the opportunity to meet and speak with several luminaries of the global security ecosystem: Roger Hale – Chief Security Officer; BigID, Sounil Yu – CISO and... Read more »

Barely one-third of IT pros can vet code for tampering

Global research commissioned by ReversingLabs and conducted by Dimensional Research, revealed that software development teams are increasingly concerned about supply chain attacks and tampering, but barely a third said... Read more »
Subscribe to our Newsletter