Commvault acquires Clumio to accelerate cyber resilience capabilities for AWS

Commvault announced it will acquire Clumio, a technology leader in data protection for critical cloud data in AWS. This transaction enables Commvault to leverage Clumio’s AWS offerings to provide... Read more »

NetAlertX: Open-source Wi-Fi intruder detector

NetAlertX is an open-source Wi-Fi/LAN intruder detection tool that scans your network for connected devices and alerts you when new or unknown devices are detected. It provides visibility into... Read more »

Securing non-human identities: Why fragmented strategies fail

In this Help Net Security interview, John Yeoh, Global VP of Research at CSA, discusses the growing security challenges posed by non-human identities (NHIs). With NHIs now outnumbering human... Read more »

Cybersecurity jobs available right now: September 25, 2024

CISO Guardz | Israel | Hybrid – View job details As a CISO, you will develop and implement security policies and procedures to enhance the security of the company’s... Read more »

41% concerned about job security due to skill gaps

35% of employees lack confidence that they have the skills required to succeed in their roles, according to Skillsoft. Additionally, 41% expressed concerns about job security due to gaps... Read more »

Organizations are making email more secure, and it’s paying off

Compromised identities have been a central component of countless costly breaches this year, according to Red Canary. Rise in identity and cloud-native attacks While most of the threats and... Read more »

Transportation, logistics companies targeted with lures impersonating fleet management software

Financially motivated threat actors are targeting North American companies in the transportation and logistics sector with tailored lures, info-stealing malware, and a clever new trick. How the attack unfolds... Read more »

Osano reduces complexity for data privacy professionals

Osano announced advanced capabilities within its platform, including tighter integration of its data mapping and assessment modules and powerful reporting and risk management capabilities. Privacy teams are often under-resourced... Read more »

KELA Identity Guard detects and intercepts compromised assets

KELA launched Identity Guard, the first line of defense to help combat the #1 cause of data breaches – compromised corporate assets and identities. Identity Guard is a critical... Read more »

Cloudflare helps secure popular messaging applications

Cloudflare announced a new service to verify the integrity of public keys in the end-to-end encryption of popular messaging applications. When using end-to-end encryption messaging applications, a public-private key... Read more »
Subscribe to our Newsletter