Ask any security professional and they’ll tell you that remediating risks from various siloed security scanning…
CrowdStrike Reports Surging Adoption Of Identity, Cloud Security Tools
CrowdStrike products within increasingly critical segments such as identity protection and cloud security are seeing rapid…
SentinelOne Shuts Down Wiz Acquisition Talk: Reports
SentinelOne has ended its “exclusive” partnership with cloud security firm Wiz, in the wake of comments…
Judy Security Adding MSPs For Its ‘All-In-One’ SMB Security Platform
Judy Security, which offers a unified cybersecurity platform for small and medium-sized businesses, is looking to…
IPO-Bound Optiv Expands Managed Security, Vulnerability Services
As Optiv adds to its portfolio of service offerings, the company is also preparing for an…
Barracuda Attackers Targeted Governments Across U.S.: Researchers
Researchers at Mandiant disclosed further details Tuesday on the China-linked cyberattack campaign that exploited Barracuda’s Email…
Hackers Can Exploit Windows Container Isolation Framework to Bypass Endpoint Security
New findings show that malicious actors could leverage a sneaky malware detection evasion technique and bypass…
How Generative AI Can Fill the Workforce Gap
Will AI take my job? Maybe or maybe not. But it can certainly help ease the…
DDoS-for-Hire Services: Trends and Enforcement
The demand for DDoS-for-hire services has surged significantly in recent years. Cameron Schroeder, chief of the…
Thinking of Deploying Generative AI? You May Already Have
Enterprises have been keenly exploring the potential of generative AI, deploying it to fuel innovation in…