A critical vulnerability discovered in a firewall appliance made by Genua could be very useful to threat actors once they’ve gained access to an organization’s network. [Read More]
IT asset management company Axonius has raised $100 million in Series D funding at more than $1 billion valuation, the company told SecurityWeek. [Read More]
HYAS, a Victoria, Canada-based provider of threat intelligence based on adversary infrastructure, has closed a $16 million Series B round of funding led by S3 Ventures. [Read More]
NEWS ANALYSIS: CrowdStrike said it will shell out a whopping $400 million to snap up a Splunk competitor and present itself as the security data lake for enterprise customers. We look at how the move affects the EDR, xDR and SIEM categories. [Read More]
Apple has published an updated Platform Security Guide, providing detailed technical explanations on the security features and technology implemented in its products. [Read More]
France's national cybersecurity agency is publicly blaming the Sandworm APT group for a string of long-term intrusions at European software and web hosting organizations. [Read More]
CYE, a Tel Aviv, Israel-based company on a mission to help companies identify “real-life” cyber risks by leveraging humans and machines, has raised $100 million in growth funding through a financing round led by private equity firm EQT. [Read More]
Security tools, regardless of where they have been deployed, need to be able leverage common security intelligence feeds and share alerts and threat data with other security tools.
If the history of cybersecurity has taught us anything, it’s that any time that we implement a new tool, a new capability, or a new functionality, security threats follow.
In the world of information security, it’s hard to flip between internet browser tabs without hearing a new term, and one of the biggest in 2020 was Secure Access Service Edge (SASE).
Multi-vendor environments with disparate security solutions that don’t integrate when deployed make it impossible for organizations to securely use the flexible network environments they need to compete effectively.
Keeping a ‘six foot distance’ between our digital home life and digital work life can go a long way when it comes to safeguarding our most sensitive data, too.
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
SD-WAN connections are designed to constantly shift and adjust, replacing one connection that has become unstable with another without interrupting application performance.
The phrase “assume breach” has been transformational to enterprise security investment and defensive strategy for a few years but may now be close to retirement.