Survey Provides Takeaways for Security Pros to Operationalize their Remediation Life Cycle

Ask any security professional and they’ll tell you that remediating risks from various siloed security scanning…

CrowdStrike Reports Surging Adoption Of Identity, Cloud Security Tools

CrowdStrike products within increasingly critical segments such as identity protection and cloud security are seeing rapid…

SentinelOne Shuts Down Wiz Acquisition Talk: Reports

SentinelOne has ended its “exclusive” partnership with cloud security firm Wiz, in the wake of comments…

Judy Security Adding MSPs For Its ‘All-In-One’ SMB Security Platform

Judy Security, which offers a unified cybersecurity platform for small and medium-sized businesses, is looking to…

IPO-Bound Optiv Expands Managed Security, Vulnerability Services

As Optiv adds to its portfolio of service offerings, the company is also preparing for an…

Barracuda Attackers Targeted Governments Across U.S.: Researchers

Researchers at Mandiant disclosed further details Tuesday on the China-linked cyberattack campaign that exploited Barracuda’s Email…

Hackers Can Exploit Windows Container Isolation Framework to Bypass Endpoint Security

New findings show that malicious actors could leverage a sneaky malware detection evasion technique and bypass…

How Generative AI Can Fill the Workforce Gap

Will AI take my job? Maybe or maybe not. But it can certainly help ease the…

DDoS-for-Hire Services: Trends and Enforcement

The demand for DDoS-for-hire services has surged significantly in recent years. Cameron Schroeder, chief of the…

Thinking of Deploying Generative AI? You May Already Have

Enterprises have been keenly exploring the potential of generative AI, deploying it to fuel innovation in…