Please turn on your JavaScript for this page to function normally.
Software
SolarWinds Database Mapper and Task Factory enable data professionals to accelerate cloud migrations

SolarWinds introduced SolarWinds Database Mapper and SolarWinds Task Factory as part of its comprehensive database ​​management portfolio, strengthening the company’s offering …

target
List of IT assets an attacker is most likely to target for exploitation

Randori released a report that identifies the most tempting IT assets that an attacker is likely to target and exploit. Leading up to the anniversary of the Solarwinds hack, …

collaboration
How collaboration between IT pros and senior leaders could drive the future of risk mitigation

What is an acceptable level of risk for IT pros and their organizations? The answer to this question has changed in recent years, with the threat landscape shifting …

Semperis Directory Services Protector 3.6 monitors for cyber threats in hybrid AD environments

Semperis announced the preview release of Directory Services Protector 3.6, which simplifies managing identity security in hybrid environments that use both on-premises Active …

danger
A multi-party data breach creates 26x the financial damage of single-party breach

Cyentia Institute and RiskRecon released a research that quantifies how a multi-party data breach impacts many organizations in today’s interconnected digital world. The study …

Jscrambler raises $15M to augment marketing and sales resources in the U.S. and European markets

Jscrambler announced it has raised $15 million in Series A financing for website and mobile app security to rewrite the rules of website security. The round was led by Ace …

Stairwell Inception helps organizations get ahead of the most sophisticated attackers

Stairwell launched Inception, a platform for recursive threat hunting, detection, and response. Inception helps security practitioners decisively and quickly determine if they …

Woman working on laptop
Tech pros reporting a positive perception of their roles, looking forward to what lies ahead

Amidst ongoing pandemic-driven change at work and at home, a SolarWinds survey seeks to understand how tech pros feel about their daily roles and responsibilities, the lessons …

Beyond Identity’s solution secures the software supply chain against insider threats and malicious attacks

Beyond Identity announced a solution that closes a critical vulnerability and secures the software supply chain against insider threats and malicious attacks. Beyond …

lock
Execs concerned about software supply chain security, but not taking action

Venafi announced survey results highlighting the challenges of improving software supply chain security. The survey evaluated the opinions of more than 1,000 IT and …

Titania’s module automates the audit process for mission critical CMMC security practices

Titania launched new tool to automate checks of core network security practices of the defense industrial base to meet the specifications set by the Department of Defense …

shield
Protecting your company from fourth-party risk

In a world that is becoming ever more interconnected, organizations are learning firsthand that they are not only vulnerable to the adverse events that their vendors …

Don't miss

Cybersecurity news