Please turn on your JavaScript for this page to function normally.
Illumio Core advancements help protect key assets from cyberattacks and ransomware

Illumio announced new innovations in Illumio Core which automate, accelerate, and simplify the path to a zero trust posture. Cyberattacks and ransomware are most successful …

IBM provides Kestrel, a threat hunting tool, to Open Cybersecurity Alliance

Open Cybersecurity Alliance (OCA) announced it has accepted IBM’s contribution of Kestrel, an open-source programming language for threat hunting that is used by Security …

Axonius unveils business unit focused on research and product development

Axonius launched a new business unit focused on innovation and growth avenues beyond the existing core solution already used by hundreds of companies worldwide. AxoniusX will …

Bishop Fox appoints Patty Wright as SVP and GM of consulting

Bishop Fox announced the appointment of accomplished industry executive, Patty Wright, as senior vice president and general manager of consulting. Wright brings a wealth of …

Momentum Cyber announces firm promotions and team expansion

Momentum Cyber announced firm promotions, team expansion, and record firm performance and transaction velocity to kick off 2021. Promotions and team expansion Momentum Cyber …

Medigate partners with Rapid7 to secure real time health by protecting healthcare IoT devices

Medigate announced its partnership with Rapid7. Together, the two firms are dedicated to securing real time health. The joint solution will enable healthcare delivery …

Rapid7 acquires Alcide.IO to extend cloud security

Rapid7 announced it has acquired Alcide.IO. This is the second acquisition Rapid7 has made in the cloud security market in the past nine months, having acquired DivvyCloud, a …

How do I select a pentesting solution for my business?

Given the number of vulnerabilities that have gone global in the past few years, enterprises can’t afford to keep relying on reactive security. Just hoping that an alert …

cloud complexity
Why the rapid transition to cloud demands that DevOps shift left

To accommodate remote work policies amid COVID-19, companies have increasingly adopted the public cloud to support off-site business continuity. A MarketsandMarkets analysis …

Cisco
Attackers are exploiting Cisco ASA/FTD flaw in search for sensitive data

An unauthenticated file read vulnerability (CVE-2020-3452) affecting Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software is being exploited by …

network
Internet security is improving, but exposures still run rampant

Rapid7’s research found that the security of the internet overall is improving. The number of insecure services such as SMB, Telnet, rsync, and the core email protocols, …

SIEM
How do I select a SIEM solution for my business?

A Security Information and Event Management (SIEM) solution collects and analyzes activity from numerous resources across your IT infrastructure. A SIEM can provide …

Don't miss

Cybersecurity news