AxoSyslog: Open-source scalable security data processor

AxoSyslog is a syslog-ng fork, created and maintained by the original creator of syslog-ng, Balazs Scheidler, and his team. “We first started by making syslog-ng more cloud-ready: we packaged... Read more »

Full recovery from breaches takes longer than expected

In 2024, businesses reported taking an average of 7.3 months to recover from cybersecurity breaches – 25% longer than expected and over a month past the anticipated timeline of... Read more »

Vishing, Wangiri, and Other VoIP Fraud Tactics On the Rise

Protect your business from VoIP fraud. Learn how to recognize the most common types and harden your phone system security. Read more »

Dell Unveils AI and Cybersecurity Solutions at Microsoft Ignite 2024

Dell announced new AI and cybersecurity advancements at Microsoft Ignite, including APEX File Storage and Copilot services for Azure. Read more »

Microsoft Ignite 2024 Unveils Groundbreaking AI, Security, and Teams Innovations

Microsoft Ignite 2024 unveils groundbreaking AI, security, and Teams innovations, shaping the future of enterprise tech and digital transformation. Read more »

Open-source and free Android password managers that prioritize your privacy

We’re often told to use strong, unique passwords, especially for important accounts like email, banking, and social media. However, managing different passwords for numerous accounts can be challenging. Password... Read more »

Critical vulnerabilities persist in high-risk sectors

Finance and insurance sectors found to have the highest number of critical vulnerabilities, according to Black Duck. Finance and insurance industry faces highest vulnerabilities The report, which analyzes data... Read more »

Patch Tuesday: Four Critical Vulnerabilities Paved Over

The November 2024 Microsoft updates let Windows 11 users remap the Copilot button. Read more »

Powerpipe: Open-source dashboards for DevOps

Powerpipe is an open-source solution designed to streamline DevOps management with powerful visualization and compliance tools, making it simple to track, assess, and act on key data for smarter... Read more »

Am I Isolated: Open-source container security benchmark

Am I Isolated is an open-source container security benchmark that probes users’ runtime environments and tests for container isolation. The Rust-based container runtime scanner runs as a container, detecting... Read more »
Subscribe to our Newsletter