IOTech Edge XRT 2.0 simplifies the development of time-critical OT applications

IOTech released Edge XRT 2.0, an open software platform designed for time-critical and embedded OT applications at the industrial IoT edge. Edge XRT 2.0 greatly simplifies the development of... Read more »

Attackers still exploit Log4Shell on VMware Horizon servers, CISA warns

If your organization is running VMware Horizon and Unified Access Gateway servers and you haven’t implemented the patches or workarounds to fix/mitigate the Log4Shell vulnerability (CVE-2021-44228) in December 2021,... Read more »

Cloudflare One Partner Program enables companies of all sizes to adopt zero trust strategies

Cloudflare announced the new Cloudflare One Partner Program. The Program presents a new way for the channel to integrate and extend Cloudflare One, a cloud-native solution with global network... Read more »

What stolen info can be bought off the dark web, and for how much?

Privacy Affairs researchers concluded criminals using the dark web can get a complete set of a person’s account details, enabling them to create fake IDs and forge private documents,... Read more »

New infosec products of the week: June 24, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Arcserve, Cavelo, ComplyCube, CompoSecure, and Hillstone Networks. Arcserve N Series appliances allow organizations to... Read more »

iPaaS: The latest enterprise cybersecurity risk?

iPaaS apps are vulnerable because they transport highly sensitive data from core systems, include many different third-party apps in the process, and often lack security tools to govern and... Read more »

How companies are prioritizing infosec and compliance priorities

New research conducted by Enterprise Management Associates (EMA), examines the impact of the compliance budget on security strategy and priorities. It describes areas for which companies prioritize information security... Read more »

Risky behavior reduced when executives put focus on identity security

Managing identities accessing enterprise resources has become significantly more complicated over the last several years. Between the increasing number of identities, the challenges posed by phishing attacks, and the... Read more »

Despite known security issues, VPN usage continues to thrive

VPN usage is still prevalent among 90% of security teams who have highlighted cost, time, and difficulty as reasons to not move forward with ZTNA adoption, according to a... Read more »

Ermetic enables organizations to provide secure JIT access to cloud environments for developers

Ermetic announced the Ermetic Platform now enables organizations to automate the process of granting developers and DevOps teams “Just in Time” (JIT) access to cloud infrastructure environments. These new... Read more »
Subscribe to our Newsletter