Please turn on your JavaScript for this page to function normally.
data analytics
Most cybersecurity investments aren’t used to their full advantage

While organizations are slashing budgets across other departments, IT and security budgets are growing to address evolving IT infrastructure and rising threats from new …

Red Piranha
Product showcase: Red Piranha’s security first, single vendor SASE, collaboration with Intel

Red Piranha has released the latest Crystal Eye consolidated security platform officially in global collaboration with Intel on the 12th of October and more details on the …

brain
Tech leaders struggle to keep up with AI advances

New data reveals artificial intelligence is challenging organizations in significant ways, with only 15% of global tech leaders reporting they are prepared for the demands of …

Microsoft
Microsoft Authenticator suppresses suspicious MFA notifications

Microsoft has quietly rolled out a new mechanism that shields users of its mobile Authenticator app from suspicious (and annoying) push notifications triggered by attackers. …

Sumo Logic
Sumo Logic discloses potential breach via compromised AWS credential

Cloud-native big data and security analytics firm Sumo Logic is investigating a potential security incident within their platform, the company revealed on Tuesday. The Sumo …

Marina Bay Sands
Marina Bay Sands breach exposed data of 665,000 customers

Singapore-based luxury resort and casino Marina Bay Sands has suffered a data breach that exposed data of 665,000 non-casino rewards program members. The Marina Bay Sands data …

ransomware attack
The 3 key stages of ransomware attacks and useful indicators of compromise

For SOC teams to be able to defend their organization against ransomware attacks, they need to have the right security toolset, but also an understanding of the three primary …

Trivy
Aqua Trivy open-source security scanner now finds Kubernetes security risks

The Aqua Trivy open-source scanner now supports vulnerability scanning for Kubernetes components and Kubernetes Bill of Materials (KBOM) generation. Now, companies can better …

brain
Companies have good reasons to be concerned about generative AI

Companies need help to get visibility into the operations of their AI programs, potentially reducing productivity while creating significant risks around governance, data …

Microsoft Azure
Uphold Linux systems’ performance and availability in Azure

Cloud computing carries many benefits for your business… as long as you can ensure the performance and availability of your cloud environments. Let’s take the following …

Ultimate CISSP Guide
Download: The Ultimate Guide to the CISSP

The Ultimate Guide to the CISSP covers everything you need about the world’s premier cybersecurity leadership certification. Learn how CISSP and ISC2 will not only help you …

Microsoft introduces new access policies in Entra to boost MFA usage

As part of a broader initiative to strengthen security, Microsoft is rolling out Microsoft-managed Conditional Access policies in Entra ID (formerly Azure Active Directory) to …

Don't miss

Cybersecurity news