Lumu Incident View empowers security teams to prioritize incidents based on the progression of attacks

Lumu launched Lumu’s Incident View, providing cybersecurity operators with a single view of their company’s cybersecurity stack for threat investigations. Built for proficient cybersecurity operations, its new feature is... Read more »

Qualys VMDR 2.0 with TruRisk: Taking vulnerability management to the next level

In this interview for Help Net Security, Mehul Revankar, VP of Product Management & Engineering for VMDR at Qualys, talks about Qualys Vulnerability Management, Detection and Response (VMDR) 2.0... Read more »

HackerOne OpenASM enables customers to leverage scan data from multiple vendors

HackerOne announced OpenASM, an initiative that combines scan data from customers’ attack surface management (ASM) tools with security testing efforts. Attack surface scans can be used to better set... Read more »

BEC attacks have risen 53% year-over-year

Armorblox released a report which highlights the use of language-based attacks that bypass existing email security controls. The report uncovers how the continued increase in remote work has made... Read more »

OpenText expands its suite of security solutions to strengthen cyber resilience posture for enterprises

OpenText announced an expanded suite of security solutions to address the heightened state of cyber security in today’s vulnerable world. With OpenText, organizations of every size can protect their... Read more »

Skyhigh Security SSE platform enhancements protect data regardless of where it lies

Skyhigh Security announced new enhancements to its Secure Service Edge (SSE) platform at RSA Conference 2022. These latest innovations to Skyhigh Security’s Secure Web Gateway (SWG), Cloud Access Security... Read more »

Healthcare-specific cybersecurity problems and how to address them

Sophisticated cyberattacks are crippling healthcare providers by posing a threat to core functions and patient privacy, according to Software Advice survey. Findings reveal that 22% of small practices and... Read more »

Intelligence must drive strategic decisions

Today’s world is hyperconnected and there’s more freely available information than ever before. You would think that this would make it easier for companies to make informed decisions, but... Read more »

Four steps to successful empathetic investigations

How security conducts employee investigations needs to change. All too often, security investigations are an attempt to get an employee to admit to suspected wrongdoing. Times have changed. Instead... Read more »

The costs and damages of DNS attacks

EfficientIP has announced the findings of its eighth annual 2022 Global DNS Threat Report, conducted by IDC, which reveals the damaging impact Domain Name System (DNS) attacks have had... Read more »
Subscribe to our Newsletter