Illumio Core advancements help protect key assets from cyberattacks and ransomware
Illumio announced new innovations in Illumio Core which automate, accelerate, and simplify the path to a zero trust posture. Cyberattacks and ransomware are most successful …
IBM provides Kestrel, a threat hunting tool, to Open Cybersecurity Alliance
Open Cybersecurity Alliance (OCA) announced it has accepted IBM’s contribution of Kestrel, an open-source programming language for threat hunting that is used by Security …
Axonius unveils business unit focused on research and product development
Axonius launched a new business unit focused on innovation and growth avenues beyond the existing core solution already used by hundreds of companies worldwide. AxoniusX will …
Bishop Fox appoints Patty Wright as SVP and GM of consulting
Bishop Fox announced the appointment of accomplished industry executive, Patty Wright, as senior vice president and general manager of consulting. Wright brings a wealth of …
Momentum Cyber announces firm promotions and team expansion
Momentum Cyber announced firm promotions, team expansion, and record firm performance and transaction velocity to kick off 2021. Promotions and team expansion Momentum Cyber …
Medigate partners with Rapid7 to secure real time health by protecting healthcare IoT devices
Medigate announced its partnership with Rapid7. Together, the two firms are dedicated to securing real time health. The joint solution will enable healthcare delivery …
Rapid7 acquires Alcide.IO to extend cloud security
Rapid7 announced it has acquired Alcide.IO. This is the second acquisition Rapid7 has made in the cloud security market in the past nine months, having acquired DivvyCloud, a …
How do I select a pentesting solution for my business?
Given the number of vulnerabilities that have gone global in the past few years, enterprises can’t afford to keep relying on reactive security. Just hoping that an alert …
Why the rapid transition to cloud demands that DevOps shift left
To accommodate remote work policies amid COVID-19, companies have increasingly adopted the public cloud to support off-site business continuity. A MarketsandMarkets analysis …
Attackers are exploiting Cisco ASA/FTD flaw in search for sensitive data
An unauthenticated file read vulnerability (CVE-2020-3452) affecting Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software is being exploited by …
Internet security is improving, but exposures still run rampant
Rapid7’s research found that the security of the internet overall is improving. The number of insecure services such as SMB, Telnet, rsync, and the core email protocols, …
How do I select a SIEM solution for my business?
A Security Information and Event Management (SIEM) solution collects and analyzes activity from numerous resources across your IT infrastructure. A SIEM can provide …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments