U.S. CISA adds N-able N-Central flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds N-able N-Central flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added N-able N-Central flaws to... Read more »

Zoom patches critical Windows flaw allowing privilege escalation

Zoom fixed a critical Windows client flaw (CVE-2025-49457, CVSS 9.6) involving an untrusted search path that could enable privilege escalation. Cloud-based video conferencing and online collaboration platform Zoom addressed... Read more »

Manpower data breach impacted 144,180 individuals

Global staffing and workforce solutions firm Manpower reports a January RansomHub ransomware attack that compromised data of 140,000 individuals. Manpower in Lansing, Michigan, reported that the ransomware attack that... Read more »

Brivo Visitor Management, powered by Envoy, boosts front-desk security

Brivo a strategic partnership with Envoy. The integration brings Envoy’s workplace platform, designed to connect people, spaces, and data, into Brivo Security Suite. Together, Brivo Visitor Management powered by... Read more »

Protecting your data in the EU means protecting an independent authority 

As the EU faces mounting scrutiny over institutional transparency, ensuring the genuine independence of the European Data Protection Supervisor is key to preserving the rule of law and the... Read more »

AI security governance converts disorder into deliberate innovation

AI security governance provides a stable compass, channeling efforts and transforming AI from an experimental tool to a reliable, enterprise-class solution. With adequate governance built at the center of... Read more »

Open-source flow monitoring with SENSOR: Benefits and trade-offs

Flow monitoring tools are useful for tracking traffic patterns, planning capacity, and spotting threats. But many off-the-shelf solutions come with steep licensing costs and hardware demands, especially if you... Read more »

The top CTEM platforms you should know in 2025

Continuous Threat Exposure Management (CTEM) is a modern cybersecurity strategy originally coined by Gartner analysts, which focuses on identifying, prioritizing, validating, and mobilizing teams to reduce threat exposure across... Read more »

Professional services firms stuck in network security IT doom loop

Survey reveals a widening disconnect in the professional services sector where, despite near-universal adoption of SaaS and cloud strategies, core network and security services are failing to keep up... Read more »

Free courses: Master AI tools from Microsoft, AWS, and Google

Learn how AI technologies can be applied to enhance security, create safe and responsible applications, develop intelligent agents, and improve information discovery. You’ll gain practical skills, explore new tools,... Read more »
Subscribe to our Newsletter