Crossword Cybersecurity Supply Chain Cyber practice improves supply chain resilience for organizations

Crossword Cybersecurity announced the creation of a new integrated Supply Chain Cyber practice. In response to client demand and the substantial increase in supply chain cyber threat levels, the... Read more »

Researchers uncover ZuoRAT malware targeting home-office routers

Black Lotus Labs discovered a new remote access trojan (RAT) called ZuoRAT, which targets remote workers via their small office/home office (SOHO) devices, including models from ASUS, Cisco, DrayTek... Read more »

VMware vSphere+ and vSAN+ provide centralized cloud-based infrastructure management

VMware unveiled VMware vSphere+ and VMware vSAN+ to help organizations bring the benefits of the cloud to their existing on-premises infrastructure with no disruption to their workloads or hosts.... Read more »

Nasuni acquires Storage Made Easy to strengthen its file data services

Nasuni announced it has acquired Storage Made Easy (SME), a file data management company that offers remote work and compliance solutions for cloud file storage. Financial details of the... Read more »

What are the solutions to cybersecurity hiring challenges?

(ISC)² published findings from its 2022 Cybersecurity Hiring Managers research that shed light on best practices for recruiting, hiring and onboarding entry- and junior-level cybersecurity practitioners. “With a global... Read more »

Peer Software partners with Pulsar Security to help enterprise customers combat ransomware attacks

Peer Software announced the formation of a strategic alliance with Pulsar Security. Through the alliance, Peer Software will leverage Pulsar Security’s team of cyber security experts to continuously monitor... Read more »

Detection, isolation, and negotiation: Improving your ransomware preparedness and response

The risks presented by ransomware and cyber extortion events have likely found a place in your own security team’s discussions, and rightfully so. Ransomware attacks have proliferated in the... Read more »

Exploring the insecurity of readily available Wi-Fi networks

In this video for Help Net Security, Andy Thompson, Global Research Evangelist at CyberArk, talks about Wi-Fi security. He walks you through various protocols we see in the wild,... Read more »

Trends to watch when creating security strategy for the next two years

Executive performance evaluations will be increasingly linked to ability to manage cyber risk; almost one-third of nations will regulate ransomware response within the next three years; and security platform... Read more »

Threat actors increasingly use third parties to run their scams

Abnormal Security released new research that showcases a rising trend in financial supply chain compromise as threat actors impersonate vendors more than ever before. In January 2022, the number... Read more »
Subscribe to our Newsletter