TP-Link has unveiled Wi-Fi 7 full home networking solution and business Wi-Fi 7 product line. TP-Link’s line features Deco Wi-Fi 7 systems, Wi-Fi 7 routers, Omada EAPs and Aginet... Read more »
Swimlane and Nozomi Networks have announced a technology integration that combines low-code security automation with operational technology (OT) and Internet of Things (IoT) security. The combined solution makes it... Read more »
42Crunch has become corporate member of the Open Web Application Security Project (OWASP), a worldwide not-for-profit charitable organization focused on improving the security of software. 42Crunch have always been... Read more »
Alif has collaborated with Telit to deliver developer kits that provide cloud-connected hardware and software reference designs for a wide variety of distributed and IoT edge applications. The kits... Read more »
Sempre Solucions and Ivanti partnership follows Ivanti’s continued expansion into the ITSM, Digital Workspace and Security markets with its recent acquisitions of Cherwell, MobileIron, Pulse Secure and RiskSense. This... Read more »
ThreatLocker has acquired Third Wall and with the addition of Third Wall’s lockdown policies to ThreatLocker existing solutions, Managed Service Providers (MSPs) will now be able to harden Windows... Read more »
YL Ventures has unveiled that Frank Kim has joined as its new full-time CISO (Chief Information Security Officer)-in-Residence. The SANS fellow, already a seasoned advisor and angel investor to... Read more »
AppOmni has expanded its leadership team and added Neill Occhiogrosso as the company’s first chief operating officer. His extensive experience helping to scale SaaS companies will drive operational excellence... Read more »
ThreatX has launched the ThreatX Academy, an online portal hosting an extensive library of cybersecurity training modules. These courses provide an accessible and approachable opportunity for those looking to... Read more »
Given that 2021 was a record year for new vulnerabilities published and threat actors became better at weaponizing vulnerabilities, timely and well-judged vulnerability prioritization and remediation are a goal... Read more »