Certa, has unveiled its official partnership with ID-Pal. Using a blend of biometric, document, and database checks, ID-Pal’s solution will enable Certa customers to verify the identity of third-party... Read more »
Cynerio has formed a partnership with Sodexo to provide hospitals and healthcare systems with visibility into their IoMT footprint that allows for the immediate remediation of identified threats through... Read more »
IBM and Wasabi Technologies are collaborating to drive data innovation across hybrid cloud environments. This collaboration aims to allow enterprises to run applications across any environment – on-premises, in... Read more »
Votiro has raised $11.5 million in a Series A funding round led by Harvest Lane Asset Management to accelerate its marketing and sales reach in North America. Votiro is... Read more »
Attackers are exploiting a critical vulnerability (CVE-2022-47986) in the IBM Aspera Faspex centralized file transfer solution to breach organizations. About CVE-2022-47986 IBM Aspera Faspex is used by organizations to... Read more »
Suspected state-sponsored threat actors have trojanized the official Windows desktop app of the widely used 3CX softphone solution, a number of cybersecurity companies began warning on Wednesday. What is... Read more »
The journey towards digital transformation for organizations and governments has been fraught with difficulties, resulting in some users needing to catch up as more digital services are introduced. In... Read more »
In this Help Net Security interview, Tomasz Kowalski, CEO at Secfense emphasizes the significance of multi-factor authentication in the corporate landscape, highlights the use of microauthorizations to improve the... Read more »
The release of a cybersecurity maturity assessment tool by the European Union Agency for Cybersecurity (ENISA) aims to provide Small and Medium Enterprises (SMEs) with a valuable resource for... Read more »
Organizations are leaving common attack paths exposed in their quest to combat emergent threats, according to Cymulate. The most concerning cyber threats The report delves into the efficacy of... Read more »