Cyware announces the successful completion of the System and Organization Controls (SOC) 2 Type 2 Audit for the trust services criteria relevant to Security (“applicable trust services criteria”) set... Read more »
Bectran has released an identity validation solution designed to streamline the customer onboarding process with increased security. The Bectran All-in-One Credit, Collections & Accounts Receivable Management Platform can now... Read more »
Datadog released Datadog Audit Trail, a new service that enables customers to audit all changes within the Datadog platform. Together with Datadog Sensitive Data Scanner and role-based access control... Read more »
IOTech released Edge XRT 2.0, an open software platform designed for time-critical and embedded OT applications at the industrial IoT edge. Edge XRT 2.0 greatly simplifies the development of... Read more »
If your organization is running VMware Horizon and Unified Access Gateway servers and you haven’t implemented the patches or workarounds to fix/mitigate the Log4Shell vulnerability (CVE-2021-44228) in December 2021,... Read more »
Cloudflare announced the new Cloudflare One Partner Program. The Program presents a new way for the channel to integrate and extend Cloudflare One, a cloud-native solution with global network... Read more »
Privacy Affairs researchers concluded criminals using the dark web can get a complete set of a person’s account details, enabling them to create fake IDs and forge private documents,... Read more »
Here’s a look at the most interesting products from the past week, featuring releases from Arcserve, Cavelo, ComplyCube, CompoSecure, and Hillstone Networks. Arcserve N Series appliances allow organizations to... Read more »
iPaaS apps are vulnerable because they transport highly sensitive data from core systems, include many different third-party apps in the process, and often lack security tools to govern and... Read more »
New research conducted by Enterprise Management Associates (EMA), examines the impact of the compliance budget on security strategy and priorities. It describes areas for which companies prioritize information security... Read more »