Please turn on your JavaScript for this page to function normally.
ransomware
How to deal with ransomware attacks

Used in cyberattacks that can paralyze organizations, ransomware is malicious software that encrypts a computer system’s data and demands payment to restore access. To help …

Shujinko’s free automation software helps auditors and clients streamline SOC 2 preparation and readiness

Shujinko announced the availability of free automation software to help auditors and their clients streamline SOC 2 audit preparation and readiness. This free solution …

CoreStack compliance and governance solution now available in the Microsoft Azure Marketplace

CoreStack announced the availability of its CoreStack AI-powered, multi-cloud compliance and governance solution in the Microsoft Azure Marketplace, an online store providing …

healthcare
Hackers are leveling up and catching healthcare off-guard

Remember when ransomware operators promised last year not to attack hospitals under siege from COVID-19? Unfortunately, that didn’t happen: hospitality, entertainment, …

CyberSaint adds NLP-backed crosswalking functionality to its CyberStrong platform

CyberSaint announced the addition of patented, Natural Language Processing (NLP)-backed crosswalking functionality to its CyberStrong platform. Organizations, regardless of …

BIO-key releases MobileAuth, a touchless biometric authentication app

BIO-key International introduced its new mobile app, BIO-key MobileAuth with PalmPositive the latest among over sixteen strong authentication factors available for …

Thales and Senetas unveil quantum resistant network encryption solution

Thales and Senetas have collaborated to launch the world’s first quantum resistant network encryption solution, capable of protecting customer data (at speeds up to 100 Gbps) …

compliance
What contractors should start to consider with the DoD’s CMMC compliance standards

Q1 2021 has been a tumultuous period in our era of cyber espionage. The Center For Strategic & International Studies (CSIS), which has been tracking “significant cyber …

CyberGRX extends Framework Mapper capability to third parties

CyberGRX announced that its Framework Mapper capability is now available to third parties. With the ability to map CyberGRX’s assessment back to industry frameworks, third …

zero
Approaching zero trust security strategically

With digital transformation efforts accelerating, the attack surface expanding exponentially and conventional perimeter-based security continuing to fail, there’s never been a …

hotel
Cybersecurity guide for the hospitality industry

A practical cybersecurity guide from the National Institute of Standards and Technology (NIST) can help hotel owners reduce the risks to a highly vulnerable and attractive …

PQShield appoints Ben Marshall as a Cryptography Engineer

PQShield announces that it is further strengthening its cryptographic hardware team with the appointment of Ben Marshall, the editor and main author of the RISC-V …

Don't miss

Cybersecurity news