Please turn on your JavaScript for this page to function normally.

Lacework acquires Soluble to strengthen its data-driven cloud security platform
Lacework announced the acquisition of Soluble, a scalable cloud infrastructure management company. The Infrastructure as Code (IaC) remediation capabilities Soluble provides, …

Vulnerability allows attackers to register malicious lookalikes of legitimate web domains
Cybercriminals were able to register malicious generic top-level domains (gTLDs) and subdomains imitating legitimate, prominent sites due to Verisign and several IaaS services …

RSAC Launch Pad 2020 participants revealed
Three cybersecurity startups have been selected to participate in the RSAC Launch Pad 2020. The event gives early stage startups a platform to introduce their potentially …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility