Virtana has named Amit Rathi Vice President of Engineering. This addition will further Virtana’s commitment to building a strong leadership team and a customer-focused software company. Amit brings a... Read more »
The world’s increasingly fraught geopolitical situation has precipitated a concerning variety of cyber attacks targeting individuals, corporations, civil infrastructure, and governments. These threats have become progressively abundant and sophisticated... Read more »
CompTIA announced the worldwide release of a new CompTIA Linux+ certification exam, a job-focused Linux certification covering the latest foundational skills demanded by hiring managers. The new CompTIA Linux+... Read more »
Kroll announced that its Cyber Risk practice has expanded across Central Europe in response to the heightened cyber risks organizations are facing in the region. A new office and... Read more »
A massive phishing campaign has been targeting Office 365 (i.e., Microsoft 365) users in over 10,000 organizations since September 2021 and successfully bypassing multi-factor authentication (MFA) set up to... Read more »
The number of UK organizations implementing data encryption as a core part of their cybersecurity strategy has continued to rise, with 32% introducing a policy to encrypt all corporate... Read more »
Amazon Web Services released AWS Cloud WAN, a new managed wide area network (WAN) service that connects on-premises data centers, colocation facilities, branch offices, and cloud resources to simplify... Read more »
Seasoned fraud expert PJ Rohall has recently become the new Head of Fraud Strategy & Education at SEON. In this Help Net Security interview, he talks about how he... Read more »
For soldiers on the battlefield, the act of turning on one’s smartphone has been described as the digital equivalent of lighting a cigarette, as doing so creates a signal... Read more »
Organizations vary by size, industry, level of maturity, but one thing that they all have in common is needing to know how to quickly remediate security vulnerabilities. As an... Read more »