Practical steps companies can take to defend their critical infrastructure and avoid the financial and reputational damage that could result from a breach.
Read moreIf My Organization Is Mostly in the Cloud, Do I Need a Firewall?
February 2 2022A firewall is still a valuable part of the IT security stack, but businesses need to consider all their attack surfaces.
Read moreCato Networks Delivers Instant Visibility and Control of Cloud Application Data Risk
February 2 2022CASB Cato converges a full CASB into its global SASE platform to defend enterprises against data breach and cloud-delivered threats.
Read moreINKY Outbound Mail Protection manages a multistep approval workflow providing enforcement within the email system itself.
Read moreWhiteSource Threat Report Reveals Massive Uptick In Cyberattacks Related To JavaScript npm
February 2 2022More than 1,300 malicious npm packages have been discovered for use in supply chain attacks, cryptojacking, data stealing, and more.
Read moreWhy Security Pros Are Frustrated With Cloud Security
February 2 2022As companies shift more operations to the cloud, a shortfall in security talent and too much security data wastes more than half of the time spent on security issues,...
Read moreForesite Cybersecurity Acquires Cyber Lantern
February 2 2022Support for more than 160 important compliance standards have been integrated into SaaS solution for small and midsize enterprises.
Read moreManaging Detections is Not the Same as Stopping Breaches
February 2 2022Enterprises interested in managed detection and response (MDR) services to monitor endpoints and workloads should make sure the providers have rock-solid expertise in detecting and responding to threats.
Read moreThe effect is nuanced — and fundamental to cyber defense for organizations and nations.
Read more
Recent Comments