Why did so many security vendors abandon MITRE’s stresstest?
This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...
This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Datadog's portfolio now supports the OpenTelemetry Protocol and Kubernetes. Datadog develops a platform f...
The new laws will target "key sectors" according to the European Commission. EU countries and lawmakers ag...
Thousands of websites collect data that users input into forms prior to submitting the form. Email addresses ...
Rapid7 researchers discovered a critical vulnerability in various Zyxel firewalls. The vulnerability allows h...
Material Security has fundraised around $100 million to extend and advance its products into new zones to exp...
Lincoln College in Illinois is forced to permanently close its doors after a ransomware attack at the end of ...
Microsoft launched a new offering of managed security services. Microsoft Security Experts allows organizatio...
Security specialist Eye Security will independently offer cyber insurance. The Dutch company was recently lic...
Datadog saw its revenue increase by 83 percent in the first quarter of 2022. The cloud monitoring specialist ...
GitHub wants to arm itself against supply chain attacks. Two-factor authentication (2FA) will be mandatory fo...