Devo Technology partners with CyberMaxx to give customers comprehensive security coverage

Devo Technology is announcing that it’s deepened its partnership with CyberMaxx to deliver managed detection and response (MDR) services to enterprises. In Q2 of 2023, CyberMaxx’s threat research team... Read more »

Okta AI helps companies responsibly innovate with AI

Okta announced Okta AI, a suite of AI-powered capabilities that empowers organizations to harness the power of AI to build better experiences and protect against cyberattacks. Embedded across both... Read more »

Veeam Software unveils BaaS offering for Microsoft 365 and Microsoft Azure

Veeam Software announced two new offerings which combine the confidence and reliability of Veeam’s backup and restore capabilities with the ease-of-use of Backup-as-a-Service (BaaS). Cirrus by Veeam, which is... Read more »

Robust Intelligence collaborates with MongoDB to secure generative AI models

Robust Intelligence announced a partnership with MongoDB to help customers secure generative AI models enhanced with enterprise data. The offering combines Robust Intelligence’s real-time AI Firewall with MongoDB Atlas... Read more »

Apple patches another iOS zero-day under attack (CVE-2023-42824)

Apple has released a security update for iOS and iPadOS to fix another zero-day vulnerability (CVE-2023-42824) exploited in the wild. About CVE-2023-42824 CVE-2023-42824 is a kernel vulnerability that could... Read more »

Critical Atlassian Confluence zero-day exploited by attackers (CVE-2023-22515)

Atlassian has fixed a critical zero-day vulnerability (CVE-2023-22515) in Confluence Data Center and Server that is being exploited in the wild. “Atlassian has been made aware of an issue... Read more »

Eyes everywhere: How to safely navigate the IoT video revolution

Cameras are coming to a connected device near you. Cheap image sensors from old mobile phones are flooding the market and bringing video to the Internet of Things (IoT).... Read more »

LLMs lower the barrier for entry into cybercrime

Cybercriminals employ evolving attack methodologies designed to breach traditional perimeter security, including secure email gateways, according to Egress. “Without a doubt chatbots or large language models (LLM) lower the... Read more »

High-business-impact outages are incredibly expensive

In this Help Net Security video, Peter Pezaris, Chief Strategy and Design Officer at New Relic, discusses observability adoption and how full-stack observability leads to better service-level metrics, such... Read more »

Soft skills continue to challenge the cybersecurity sector

New cybersecurity findings pinpoint areas where cybersecurity experts are lacking, with interpersonal skills, cloud computing, and security measures standing out as the most prominent skill deficiencies in cybersecurity specialists,... Read more »
Subscribe to our Newsletter