Please turn on your JavaScript for this page to function normally.
CyberGRX challenges market to take a united approach to third-party cyber risk management

CyberGRX unveiled an open online community dedicated to increasing cross organizational collaboration between risk professionals and IT teams who are struggling with the …

Vertiv introduces Intelligence platform for cloud-based monitoring

Vertiv introduced a scalable, cloud-based management platform that brings visibility, analytics and control to complex IT infrastructure, including large enterprise and …

Acronis releases new version of Acronis Data Cloud

Acronis released an update to the Acronis Data Cloud platform. The Acronis Data Cloud 7.8 update introduces cloud-to-cloud Microsoft Office 365 protection, ransomware …

Login VSI announces Release 3 of Login PI for proactive monitoring

With this release, Login VSI introduces a new concept named Deep Application Performance Testing, providing a view of application end-user experience. Login PI R3 also …

Okta unveils identity capabilities to better secure the digital workspace

Okta released two new promotional offers that allow VMware Workspace ONE customers to take advantage of the Okta Identity Cloud through their local channel partner. These two …

ThreatQuotient integrates verified breach intelligence from Visa to strengthen payment data defenses

ThreatQuotient is integrating verified breach intelligence from Visa to enable customers to detect and protect against cyber attacks targeting payment data. The integration of …

Symantec acquires Javelin Networks to thwart growing number of Active Directory-based attacks

Symantec acquired Javelin Networks, a company that offers software technology to defend enterprises against Active Directory-based attacks. Microsoft Active Directory (AD) …

Symantec acquires Appthority to enhance protection from mobile application vulnerabilities

Symantec acquired Appthority whose technology gives Symantec customers the ability to analyze mobile apps for both malicious capabilities and unsafe and unwanted behaviors, …

Lookout puts the trust in zero trust with new post-perimeter security solutions

Lookout’s new approach to cybersecurity is designed to protect businesses as their employees work from outside the corporate perimeter. With integrations to Okta, VMware …

Test IO introduces Bug Fix Confirmation, leveraging network of software testers to verify bug fixes

Test IO released a new product to help software teams verify that bugs are fixed in real-world conditions before software is released. Bug Fix Confirmation leverages test IO’s …

ISACA to update CISA exam in 2019

ISACA’s Certified Information Systems Auditor (CISA) certification is being updated in 2019 to reflect the industry trends impacting the IT audit profession. Updated CISA …

HITRUST releases Threat Catalogue to improve risk management

HITRUST is releasing its Threat Catalogue to provide organizations with visibility into the threats and risks targeting their information, assets and operations. In addition …

Don't miss

Cybersecurity news