Peer Software announced the formation of a strategic alliance with Pulsar Security. Through the alliance, Peer Software will leverage Pulsar Security’s team of cyber security experts to continuously monitor... Read more »
The risks presented by ransomware and cyber extortion events have likely found a place in your own security team’s discussions, and rightfully so. Ransomware attacks have proliferated in the... Read more »
In this video for Help Net Security, Andy Thompson, Global Research Evangelist at CyberArk, talks about Wi-Fi security. He walks you through various protocols we see in the wild,... Read more »
Executive performance evaluations will be increasingly linked to ability to manage cyber risk; almost one-third of nations will regulate ransomware response within the next three years; and security platform... Read more »
Abnormal Security released new research that showcases a rising trend in financial supply chain compromise as threat actors impersonate vendors more than ever before. In January 2022, the number... Read more »
Imperva released a new study that uncovers the rising global costs of vulnerable or insecure APIs. The analysis of nearly 117,000 unique cybersecurity incidents estimates that API insecurity results... Read more »
MITRE has promoted Beth Meinert from vice president to Senior Vice President and General Manager, MITRE Public Sector (MPS) after a competitive search for the role. In this position,... Read more »
Hexagon AB announced that Paolo Guglielmini will succeed Ola Rollén as President and CEO of Hexagon AB, effective 31 December 2022. Gun Nilsson has decided to step down as... Read more »
XM Cyber announced the acquisition of Cyber Observer, an innovator in Continuous Controls Monitoring (CCM) and Cloud Security Posture Management (CSPM). This marks the latest growth milestone for XM... Read more »
Sonatype researchers have discovered Python packages that contain malicious code that peek into and expose secret AWS credentials, network interface information, and environment variables. All those credentials and metadata... Read more »