Clumio’s new data protection and recovery capabilities protect sensitive information on AWS

Clumio announced new capabilities that will allow enterprises to protect their AWS data at any scale and recover from disruptions instantly, all while optimizing their cloud costs. These benefits... Read more »

Product showcase: ESET’s newest consumer offerings

It’s no secret that antivirus software is as essential to your computer as a power cord. However, the threats don’t stop at your devices. For example, criminals that are... Read more »

The psychological fallout of a ransomware crisis

Northwave has conducted scientific research into the psychological fallout of a ransomware crisis on both organizations and individuals. The findings reveal the deep marks that a ransomware crisis leaves... Read more »

Key cybersecurity trends in the energy sector

The key trends for the energy industry are about how we manage the future supply and demand challenges at a much more granular level than we are currently able... Read more »

Frost & Sullivan recognizes Resecurity as a leader in the cyber threat intelligence market

Resecurity announced that Frost & Sullivan recognized the company in its Global Threat Intelligence Platforms Market 2022 report. The Frost & Sullivan report details the organization’s market research, identifying... Read more »

Russian hacktivists hit Ukrainian orgs with ransomware – but no ransom demands

The Ukrainian CERT (CERT-UA) has uncovered an attack campaign aimed at compromising Ukrainian organizations and irretrievably encrypting their files. To do that, they are leveraging a specific version of... Read more »

Inadequate password and authentication requirements found in popular business web apps

Specops Software released new research finding cybersecurity weaknesses in business web apps including Shopify, Zendesk, Trello, and Stack Overflow. This Help Net Security video reveals how popular business web... Read more »

The infosec investment landscape: Which tech gets the most bucks?

How many cybersecurity vendors are active at the moment? What are they offering? How is their business doing? These are just some of the questions that Richard Stiennon, Chief... Read more »

Major shifts and the growing risk of identity fraud

Traditional identity fraud losses, caused by criminals illegally using victims’ information to steal money, exploded in 2021 to $24 billion — an alarming 79% increase over 2020, according to... Read more »

Benefits of modern PAM: Efficiency, security, compliance

Many legacy Privileged Access Management (PAM) solutions are still very manual regarding what they do and how they manage user access and permissions. They are geared toward the human... Read more »
Subscribe to our Newsletter