Industry news
U.S. Cyber Command deploys defensive operators to Croatia to hunt for malicious cyber activity
For the first time in U.S. Cyber Command history, a team of elite defensive cyber operators deployed to Croatia to hunt for malicious cyber activity on partner networks, …
Absolute boosts Secure Endpoint portfolio with resilience and intelligence capabilities
Absolute Software has enhanced its Secure Endpoint portfolio, re-enforcing the company’s commitment to empowering customers to strengthen resiliency in today’s …
Tenacity platform enhancements provide visibility into entire AWS and Azure cloud infrastructure
Tenacity Cloud launched agentless, automated and self-directed activation capability with immediate deployment within its platform. Within seconds and just a few clicks, …
Cloudera CDP One accelerates data science programs with built-in enterprise security and ML
Cloudera has launched Cloudera Data Platform (CDP) One, a data lakehouse software as a service (SaaS) offering that enables self-service analytics and exploratory data science …
Opsera unveils SaaS DevOps capabilities to improve agility and security posture for enterprises
Opsera has unveiled its enterprise-wide SaaS DevOps capabilities to manage and modernize software releases. It also announced a new study commissioned from Vernon Keenan, …
Bitwarden releases SCIM support to expand directory and identity provider integration options
Bitwarden has released support for the System for Cross-domain Identity Management (SCIM) standard. This capability allows provisioning of users from a centralized directory …
Apricorn Aegis Secure Key 3 addresses constantly evolving security threats
Apricorn released the USB 3.2 Gen 1 Aegis Secure Key 3 2TB encrypted flash key. Designed for organisations that need large amounts of encrypted storage with a minimal …
CircleCI Visual Configuration Editor allows teams to visualize and streamline complex workflows
CircleCI has unveiled the CircleCI Visual Configuration Editor, an all-in-one open source project for configuration editing, including creating component definitions and …
3M COMPLY Magnetic Attach for Monitors protects sensitive and confidential data on monitor displays
Companies can protect their data on their monitor displays, especially as more employees return to the office, with the new COMPLY Magnetic Attach for Monitors from 3M. The …
Fortanix External Key Manager pairs with Google Cloud Platform to help users tackle privacy challenges
Fortanix announced that its External Key Manager paired with Google Cloud Platform (GCP) is helping customers in Europe, and around the world, create, store and manage …
ManageEngine and Sectigo join forces to automate certificate lifecycle management
ManageEngine has integrated its key and certificate lifecycle management solution, Key Manager Plus, and Sectigo. A testament to Sectigo’s push for openness and …
TXOne Networks raises $70 million to defend industry verticals against cybersecurity threats
TXOne Networks has entered into definitive agreements in connection with its Series B financing with total investment proceeds of $70 million. The latest capital injection …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act