ESET Discovers Corporate Secrets and Data on Recycled Company Routers

ESET unveiled new research into corporate network devices that were disposed of and sold on the secondary market. After looking at configuration data from...

P0 Security’s Unique Approach to Cloud Access Management

Shashwat Sehgal is CEO and Co-founder of P0 Security, a provider of the first unified Identity Governance and Administration (IGA) and Privileged Access Management (PAM) platform...

Tanium Welcomes Tony Beller as Senior Vice President of Global Partner...

Tanium announced the arrival of industry veteran Tony Beller to its award-winning channel team. As senior vice president of global partner sales, Beller will...

Protecting Clients’ Executives from Data Breaches

By Media Sonar Recent research found that 99% of executives have personally identifiable information (PII) on over three-dozen data broker websites. There were more than three...

Siemplify Closes $30M in Series C Financing

Siemplify announced that it has secured $30 million in Series C funding led by Georgian Partners. Siemplify will use these new funds to drive significant...

Q3 2023 Phishing and Malware Report: Phishing and Malware Threats Increase...

In Q3 2023, Vade detected a substantial increase in phishing and malware attacks. Phishing volumes increased by 173% compared to the previous quarter (493.2 million...

Contrast Security’s New MSSP Program Empowers Partners to Protect Customers’ Applications...

Contrast Security announced the launch of its new Managed Security Services Program (MSSP) offering to provide partners the ability to support businesses of all sizes with...

World Password Day: 2 billion passwords found on the Dark Web highlight...

Kevin Lancaster, founder of ID Agent, a Kaseya company, provides the below tips to help individuals secure their passwords and ensure hackers don’t crack...

Insider Intelligence with Visual Click Software: Auditing and Alerting Workstation Activity

How are your computer assets being used?  Have you considered the variety of methods data can be transferred to and from your workstations?  ...

The tourist’s guide to phone theft recovery

Here is an interesting guide for travelers from NordVPN With summer travel season in full swing, thousands of tourists will unfortunately become victims of smartphone...