DH2i partners with Red Hat to accelerate container application deployments

DH2i’s DxEnterprise multi-platform smart high availability clustering software has earned Red Hat OpenShift certification on Red Hat Enterprise Linux. This certification verifies that DxEnterprise is a containerized solution that... Read more »

FireTail raises $5 million to improve API Security

FireTail has closed $5 million in early stage financing led by Paladin Capital Group, with participation from Zscaler, General Advance, Secure Octane, and a cadre of high-profile cyber security... Read more »

Anand Akela joins Acalvio as CMO

As Acalvio Technologies CMO, Anand Akela will play an integral role in driving the company’s marketing strategy as the company expands into identity threat detection and response (ITDR). With... Read more »

Skybox Security appoints Corey Williams as CMO

Corey Williams will leverage his extensive cybersecurity background to lead Skybox Security’s core marketing strategy and accelerate market growth. The seasoned marketing executive brings 25 years of experience leading... Read more »

OSV-Scanner: A free vulnerability scanner for open-source software

After releasing the Open Source Vulnerabilities database (OSV.dev) in February, Google has launched the OSV-Scanner, a free command line vulnerability scanner that open source developers can use to check... Read more »

3 major threat detection methods explained

The importance of threat detection cannot be overstated. A recent Verizon study revealed that the top discovery method (more than 50%) for breaches is in fact disclosure by the... Read more »

How companies can avoid costly data breaches

IBM found that it takes on average 277 days to discover a security breach and costs businesses an average of $4.35 million per breach. Moreover, the time-to-discovery can blindside... Read more »

Nosey Parker: Find sensitive information in textual data and Git history

Praetorian has open-sourced the regular expression-based (RegEx) scanning capabilities of its Nosey Parker secret scanning tool. Scanning filesystem content for secrets Inadvertent secrets disclosure is one of an organization’s... Read more »

What CISOs consider when building up security resilience

Cybersecurity resilience is a top priority for companies as they look to defend against a rapidly evolving threat landscape, according to Cisco. Researchers identified the top seven success factors... Read more »

Searchlight Security Ransomware Search and Insights collates dark web data on ransomware groups

Searchlight Security launched Ransomware Search and Insights, a new strategic enhancement to its Cerberus platform. Ransomware Search and Insights automatically collates data from active ransomware groups to help organizations... Read more »
Subscribe to our Newsletter