Gigamon announced the integration of the Gigamon Hawk Deep Observability Pipeline and Gigamon ThreatINSIGHT Network Detection and Response (NDR) solution with Sumo Logic, the SaaS analytics platform, to enable... Read more »
Continuing its cybersecurity expansion strategy, Thales announces the signature of an agreement to acquire OneWelcome for a total consideration of €100 million. OneWelcome’s strong digital identity lifecycle management capabilities... Read more »
Privitar announced it has acquired Kormoon, a software platform that helps organizations manage the complexities of data privacy regulations by analyzing data usage, assessing risk, and automating compliance. Kormoon’s... Read more »
Secureworks announced that it has appointed Michael Aiello as its new Chief Technology Officer (CTO). Aiello will play a pivotal role in setting the company’s long-term strategic vision to... Read more »
The July 2022 Patch Tuesday is upon us and has brought fixes for 84 CVEs in various Microsoft products, including an actively exploited zero-day: CVE-2022-22047, an elevation of privilege... Read more »
Concentric launched Eclipse, their new digital solution providing enhanced personal cybersecurity and digital privacy. Eclipse is a turnkey solution for individuals, families, and teams to help mitigate digital risks.... Read more »
Can attackers create a face mask that would defeat modern facial recognition (FR) systems? A group of researchers from from Ben-Gurion University of the Negev and Tel Aviv University... Read more »
Ivanti worked with global digital transformation experts and surveyed 10,000 office workers, IT professionals, and the C-Suite to evaluate the level of prioritization and adoption of DEX in organizations... Read more »
Two irresistible yet conflicting forces are creating a real risk for businesses that operate on the web, which is every business that exists in 2022. Those forces are tracking... Read more »
In this Help Net Security video, Neal Bridges, CISO at Query.ai, talks about the rules organizations need to think about if they way to develop successful incident response (IR)... Read more »