Cyware completes SOC 2 Type 2 Compliance for data security

Cyware announces the successful completion of the System and Organization Controls (SOC) 2 Type 2 Audit for the trust services criteria relevant to Security (“applicable trust services criteria”) set... Read more »

Bectran releases driver’s license verification solution to help businesses mitigate fraud in real-time

Bectran has released an identity validation solution designed to streamline the customer onboarding process with increased security. The Bectran All-in-One Credit, Collections & Accounts Receivable Management Platform can now... Read more »

Datadog Audit Trail enables businesses to achieve their compliance and governance objectives

Datadog released Datadog Audit Trail, a new service that enables customers to audit all changes within the Datadog platform. Together with Datadog Sensitive Data Scanner and role-based access control... Read more »

IOTech Edge XRT 2.0 simplifies the development of time-critical OT applications

IOTech released Edge XRT 2.0, an open software platform designed for time-critical and embedded OT applications at the industrial IoT edge. Edge XRT 2.0 greatly simplifies the development of... Read more »

Attackers still exploit Log4Shell on VMware Horizon servers, CISA warns

If your organization is running VMware Horizon and Unified Access Gateway servers and you haven’t implemented the patches or workarounds to fix/mitigate the Log4Shell vulnerability (CVE-2021-44228) in December 2021,... Read more »

Cloudflare One Partner Program enables companies of all sizes to adopt zero trust strategies

Cloudflare announced the new Cloudflare One Partner Program. The Program presents a new way for the channel to integrate and extend Cloudflare One, a cloud-native solution with global network... Read more »

What stolen info can be bought off the dark web, and for how much?

Privacy Affairs researchers concluded criminals using the dark web can get a complete set of a person’s account details, enabling them to create fake IDs and forge private documents,... Read more »

New infosec products of the week: June 24, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Arcserve, Cavelo, ComplyCube, CompoSecure, and Hillstone Networks. Arcserve N Series appliances allow organizations to... Read more »

iPaaS: The latest enterprise cybersecurity risk?

iPaaS apps are vulnerable because they transport highly sensitive data from core systems, include many different third-party apps in the process, and often lack security tools to govern and... Read more »

How companies are prioritizing infosec and compliance priorities

New research conducted by Enterprise Management Associates (EMA), examines the impact of the compliance budget on security strategy and priorities. It describes areas for which companies prioritize information security... Read more »
Subscribe to our Newsletter