IT asset management company Axonius has raised $100 million in Series D funding at more than $1 billion valuation, the company told SecurityWeek. [Read More]
HYAS, a Victoria, Canada-based provider of threat intelligence based on adversary infrastructure, has closed a $16 million Series B round of funding led by S3 Ventures. [Read More]
Using a new tool called COVIDGUARDIAN, a group of researchers has identified vulnerabilities in more than twenty Android contact tracing apps. [Read More]
NEWS ANALYSIS: Armorblox raises $30 million and joins a growing list of well-heeled startups taking a stab addressing one of cybersecurity’s most difficult problems: keeping malicious hackers out of corporate mailboxes. [Read More]
In response to a security breach that exposed personal information from unemployment claims, Washington Senate has unanimously passed a measure that creates a state Office of Cybersecurity. [Read More]
The services of initial access brokers, which sell access to breached organizations to the highest bidder, are increasingly sought-after, with an average price of $7,100. [Read More]
Knowing that threat intelligence is readily available and proving its worth is one thing, understanding how to use it within your security operations program is quite another.
SD-WAN connections are designed to constantly shift and adjust, replacing one connection that has become unstable with another without interrupting application performance.
It is reasonable to assume that within five years the term “confidential compute” will become superfluous and an assumed native component of all cloud services.
The COVID-19 crisis and its associated constraints has shown us that many of the activities we considered “priorities” before March are not really priorities.
The phrase “assume breach” has been transformational to enterprise security investment and defensive strategy for a few years but may now be close to retirement.
The tactics, techniques, and procedures (TTPs) used in the Twitter attack were not much different than in the majority of other data breaches and serve as valuable lessons for designing a modern cyber defense strategy.
Opportunities for accidental exposure of sensitive information are often compounded by multiple stakeholders using collaborative tools without the proper policies, oversight and security training.