Gigamon collaborates with Sumo Logic to improve security and operational efficiency for enterprises

Gigamon announced the integration of the Gigamon Hawk Deep Observability Pipeline and Gigamon ThreatINSIGHT Network Detection and Response (NDR) solution with Sumo Logic, the SaaS analytics platform, to enable... Read more »

Thales acquires OneWelcome to strengthen its authentication and data privacy portfolio

Continuing its cybersecurity expansion strategy, Thales announces the signature of an agreement to acquire OneWelcome for a total consideration of €100 million. OneWelcome’s strong digital identity lifecycle management capabilities... Read more »

Privitar acquires Kormoon to extend its data privacy and provisioning capabilities

Privitar announced it has acquired Kormoon, a software platform that helps organizations manage the complexities of data privacy regulations by analyzing data usage, assessing risk, and automating compliance. Kormoon’s... Read more »

Michael Aiello joins Secureworks as CTO

Secureworks announced that it has appointed Michael Aiello as its new Chief Technology Officer (CTO). Aiello will play a pivotal role in setting the company’s long-term strategic vision to... Read more »

Microsoft fixes exploited zero-day in Windows CSRSS (CVE-2022-22047)

The July 2022 Patch Tuesday is upon us and has brought fixes for 84 CVEs in various Microsoft products, including an actively exploited zero-day: CVE-2022-22047, an elevation of privilege... Read more »

Concentric Eclipse helps individuals and teams mitigate digital risks

Concentric launched Eclipse, their new digital solution providing enhanced personal cybersecurity and digital privacy. Eclipse is a turnkey solution for individuals, families, and teams to help mitigate digital risks.... Read more »

Researchers defeat facial recognition systems with universal face mask

Can attackers create a face mask that would defeat modern facial recognition (FR) systems? A group of researchers from from Ben-Gurion University of the Negev and Tel Aviv University... Read more »

Employees frustrated by the lack of suitable tech in a hybrid work environment

Ivanti worked with global digital transformation experts and surveyed 10,000 office workers, IT professionals, and the C-Suite to evaluate the level of prioritization and adoption of DEX in organizations... Read more »

Are your site’s tracking technologies breaking the law?

Two irresistible yet conflicting forces are creating a real risk for businesses that operate on the web, which is every business that exists in 2022. Those forces are tracking... Read more »

How to develop successful incident response plans

In this Help Net Security video, Neal Bridges, CISO at Query.ai, talks about the rules organizations need to think about if they way to develop successful incident response (IR)... Read more »
Subscribe to our Newsletter