Egnyte has launched Egnyte Document Room, a new solution powered by Egnyte’s secure platform for content collaboration and governance. With Egnyte Document Rooms, Egnyte customers can now create highly... Read more »
Blackpoint Cyber launched a brand-new Cloud Response feature, Identity Response for Azure AD. In light of the surge in identity-based attacks, where threat actors exploit victims’ login credentials from... Read more »
Pure Storage has unveiled critical new data resilience offerings, including the introduction of Pure Protect//DRaaS, a unique Disaster Recovery as a Service (DRaaS) solution, new energy efficiency guarantees for... Read more »
A critical flaw in Atlassian Confluence Data Center and Server (CVE-2023-22515) has been exploited by a state-backed threat actor, Microsoft’s threat analysts have pinpointed. About the vulnerability CVE-2023-22515 was... Read more »
BlackBerry announced two major new Unified Endpoint Management (UEM) innovations – BlackBerry UEM at the edge and BlackBerry UEM for the IoT. BlackBerry UEM software is used for managing,... Read more »
Curl v8.4.0 is out, and fixes – among other things – a high-severity SOCKS5 heap buffer overflow vulnerability (CVE-2023-38545). Appropriate patches for some older curl versions have been released,... Read more »
Microsoft 365 is a cloud-based productivity suite. Beyond just tools like Word and Excel, it integrates productivity applications with cloud functionalities, device administration, and enhanced security, all within a... Read more »
In this Help Net Security video, Anuj Goel, CEO at Cyware, explains how cyber fusion is helping enterprises modernize their security operations and turn their SOC from reactive to... Read more »
In Q2 2023, 95% of malware now arrives over encrypted connections, endpoint malware volumes are decreasing despite campaigns growing more widespread, ransomware detections are declining amid a rise in... Read more »
Cloud security is important to you, but that doesn’t mean you’re willing to trade security for functionality. You need security to work for you. Whatever cloud security resources you’re... Read more »
