Why did so many security vendors abandon MITRE’s stresstest?
This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...
This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
KKR acquires Barracuda Networks. The venture capitalist is taking the reins from Thoma Bravo, Barracuda's pre...
Roughly 96 percent of Benelux-based organisations fell victim to a cyberattack due to a supply chain vulnerab...
The breach is the second attack in six months. Panasonic has confirmed its Canadian operations were hit by...
At least 5 EU officials were attacked by hacking tools thought to have come from the Israeli NSO Group Sen...
Salt Security discovered a major API vulnerability in a widely used US fintech platform. The identity of the ...
Cisco introduces the Secure Firewall 3100 Series. The firewalls feature a new architecture for securing hybri...
Google has removed hundreds of applications from its Google Play store after discovering that they have a sof...
VMware warns customers of multiple new vulnerabilities in a range of products. Some open the doors for remote...
Avast has released new features to protect users from online scams and security threats. Avast today annou...
The Spring4Shell vulnerability is being abused in large numbers. European companies appear to be favoured amo...