At RSA Conference 2022, SafeBreach announced SafeBreach Studio, a no-code red-team automation platform security teams of all skill levels can use to create, customize and execute sophisticated attack scenarios... Read more »
Forcepoint is advancing its strategy to simplify security by previewing a new security insights visualization tool, code-named Forcepoint ‘Symphony’, and new Forcepoint FlexEdge family of Secure SD-WAN solutions at... Read more »
The shift to cloud native development, along with the increased speed in development brought about by the adoption of DevOps processes, has made the challenges connected with securing software... Read more »
Acronis debuted a new Advanced Data Loss Prevention (DLP) pack for Acronis Cyber Protect Cloud, a game-changing solution that shields managed service providers (MSPs) and businesses of all sizes... Read more »
At RSA Conference 2022, Arctic Wolf released enhanced tools and programs advancing Tetra Defense’s MyCyber platform, designed to help businesses more effectively build business resilience as well as address... Read more »
Financially motivated cybercriminals are taking advantage of schools’ need for uptime, their scarcity of cybersecurity defense resources, and lack of expertise compared to other potential targets. In fact, during... Read more »
I recently had the opportunity to meet and speak with several luminaries of the global security ecosystem: Roger Hale – Chief Security Officer; BigID, Sounil Yu – CISO and... Read more »
Global research commissioned by ReversingLabs and conducted by Dimensional Research, revealed that software development teams are increasingly concerned about supply chain attacks and tampering, but barely a third said... Read more »
The Identity Theft Resource Center (ITRC) and LexisNexis Risk Solutions have released the Pandemic-Related Identity Fraud Crime Victim Impacts Report, which shows how individuals and government agencies have been... Read more »
Illumio released The Zero Trust Impact Report, a research on market perspectives of zero trust strategies and the business impact of segmentation technology. Conducted by The Enterprise Strategy Group... Read more »