Fasoo collaborates with Egnyte to simplify data governance

Fasoo and Egnyte announced a partnership that will allow organizations to encrypt any Egnyte-managed file and inject Egnyte permissions directly into the protected file, ensuring that governance is maintained... Read more »

Cloudera partners with AWS to help organizations accelerate their modernization to the cloud

Cloudera announced that it has signed a Strategic Collaboration Agreement (SCA) with AWS. This agreement strengthens Cloudera’s relationship with AWS and demonstrates their commitment to accelerate and scale cloud... Read more »

MITRE Caldera for OT now available as extension to open-source platform

MITRE Caldera for OT is now publicly available as an extension to the open-source Caldera platform, allowing security teams to run automated adversary emulation exercises that are specifically focused... Read more »

Emerging threat: AI-powered social engineering

Social engineering is a sophisticated form of manipulation but, thanks to AI advancements, malicious groups have gained access to highly sophisticated tools, suggesting that we might be facing more... Read more »

Cyber talent gap solutions you need to know

90% of consumers across the US and UK are concerned about cybersecurity’s future if students aren’t exposed to the field at an earlier age, according to ThreatX. 88% are... Read more »

Compliance budgets under strain as inflation and workload grow

Compliance leaders are facing pressure to make the most of existing resources despite economic challenges and increased workload volume and complexity, according to Gartner. To face these challenges, leaders... Read more »

Avoidable digital certificate issues fuel data breaches

Among organizations that have suffered data breaches 58% were caused by issues related to digital certificates, according to a report by AppViewX and Forrester Consulting. As a result of... Read more »

From unsuspecting click to data compromise

Phishing is a pervasive and ever-evolving cyber threat that has become a primary concern for individuals, organizations, and cybersecurity experts worldwide. This deceptive practice involves cybercriminals using various tactics... Read more »

CIS Benchmarks Communities: Where configurations meet consensus

Have you ever wondered how technology hardening guidelines are developed? Some are determined by a particular vendor or driven by a bottom-line perspective. That’s not the case with the... Read more »

Reflectiz offers remote solution to battle Magecart attacks

Reflectiz, a cybersecurity company specializing in continuous web threat management, offers a remote solution to battle Magecart web-skimming attacks, a cyberattack involving injecting malicious code into the checkout pages.... Read more »
Subscribe to our Newsletter