
KnowBe4 evolves from security training to human risk management
Security awareness training has come a long way from its origins as a compliance checkbox. Today, it’s evol...
Security awareness training has come a long way from its origins as a compliance checkbox. Today, it’s evol...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
IBM has unveiled a new enterprise-level Secure Access Service Edge (SASE) solution designed to encourage adop...
The Microsoft Azure Cosmos DB could have been exposed for years, experts say. Microsoft has warned thousan...
A "dedicated pod of security experts" will operate as an extension of customer teams to solve complex securit...
Following a meeting at the White House, Google, Amazon, Apple, Microsoft, and IBM promise to increase cyber s...
Less than a year after it raised $6 million on seed funding, build.security is being acquired by Elastic. The...
Poly Network, the cross-chain decentralized finance platform provider, had about $600 million cryptocurrency ...
A critical flaw in older Cisco Systems routers will not be patched after the company advised users that they ...
GitHub users are urged by the platform to enable two-factor authentication, as it seeks to change how account...
A flaw in internet-connected security cameras can allow attackers to remotely watch what is recorded and brea...
Human beings are the weakest link in the chain of cybersecurity, you often hear. Roel van Rijsewijk from Thal...