CVE volumes set to increase 25% this year
22
Feb
2024

CVE volumes set to increase 25% this year

The total number of Common Vulnerabilities and Exposures (CVEs) reported in IT hardware and software products and services looks set…

Colonial First State sees GenAI making financial planning accessible
21
Feb
2024

Colonial First State sees GenAI making financial planning accessible – Finance – Software

Colonial First State sees a future role for generative AI in cutting through the complexity and cost of financial planning,…

Hacker water
21
Feb
2024

US govt shares cyberattack defense tips for water utilities

CISA, the FBI, and the Environmental Protection Agency (EPA) shared a list of defense measures U.S. water utilities should implement…

How The Security of The Cloud’s Supply Chain Will Shift in 2024
21
Feb
2024

How The Security of The Cloud’s Supply Chain Will Shift in 2024

What we can expect from advanced threat actor groups in the new year. By Jason Martin, Co-founder and Co-CEO at…

New Year, New Consumer Demands in Cybersecurity: Navigating the Landscape of Consumer Expectations and App Developer Responsibility in Mobile App Security
21
Feb
2024

New Year, New Consumer Demands in Cybersecurity: Navigating the Landscape of Consumer Expectations and App Developer Responsibility in Mobile App Security

By Alan Bavosa, VP of Security Products, Appdome The significant growth and mass adoption of mobile applications has completely transformed…

Top Software Development Outsourcing Trends
21
Feb
2024

Top Software Development Outsourcing Trends

Eastern Europe is swiftly rising to prominence in the software development outsourcing sector. This ascendance is marked not only by…

VMware EAP
21
Feb
2024

VMware Alert: Uninstall EAP Now

Feb 21, 2024NewsroomActive Directory / Vulnerability VMware is urging users to uninstall the deprecated Enhanced Authentication Plugin (EAP) following the…

NasuniIQ brings visualisation of massive unstructured datasets
21
Feb
2024

NasuniIQ brings visualisation of massive unstructured datasets

Nasuni NAS file storage customers will now be able to visualise multiple petabytes of massively distributed and heterogeneous unstructured data…

Analyzing Threat Reports with Fabric
21
Feb
2024

Analyzing Threat Reports with Fabric

We’ve just added a new Pattern to fabric. It’s called analyze_threat_report, and it’s designed to extract all the most valuable…

ScreenConnect critical bug now under attack as exploit code emerges
21
Feb
2024

ScreenConnect critical bug now under attack as exploit code emerges

Both technical details and proof-of-concept exploits are available for the two vulnerabilities ConnectWise disclosed earlier this week for ScreenConnect, its…

Signal Introduces Username to keep Your Phone Number Private
21
Feb
2024

Signal Introduces Username to keep Your Phone Number Private

Signal, the privacy-focused messaging app, has introduced a significant update allowing users to keep their phone numbers private using usernames….

Building a Better Perimeter Defense Strategy to Meet the Challenges of 2024
21
Feb
2024

Building a Better Perimeter Defense Strategy to Meet the Challenges of 2024

By Yiyi Miao, Chief Product Officer, OPSWAT In the ever-changing domain of cybersecurity, organizations continue to face multifaceted challenges with…