GUEST ESSAY: Best practices to shrink the ever-present risk of Exchange Server getting corrupted

GUEST ESSAY: Best practices to shrink the ever-present risk of Exchange Server getting corrupted

| | Guest Blog Post, Top Stories
Even in the cloud era, Microsoft Exchange Server remains a staple business communications tool across the globe. Related: The need for robust data recovery policies. One critical issue faced by organizations that rely on Exchange Server is the risk of … (more…) ... Read More
News alert: Oasis Security raises $40M funding to automate the lifecycle of non-human identities

News alert: Oasis Security raises $40M funding to automate the lifecycle of non-human identities

| | Uncategorized
Tel Aviv, Israel, Jan. 31, 2024 — Oasis Security, the leading provider of Non-human Identity Management (NIM) solutions, announced today that it raised a total of $40 million funding led by Sequoia Capital (Doug Leone, Bogomil Balkansky), alongside Accel … (more…) ... Read More
News alert: Reken raises $10M from Greycroft to protect against generative AI-enabled fraud

News alert: Reken raises $10M from Greycroft to protect against generative AI-enabled fraud

| | Top Stories, Uncategorized
San Francisco, Calif., Jan. 31, 2024 – Reken, an AI & cybersecurity company, today announced the close of its $10M oversubscribed seed round, led by Greycroft and FPV Ventures. Other investors in the round include Firebolt Ventures, Fika Ventures, Omega … (more…) ... Read More
Author Q&A: The ongoing role of fortified structures in military clashes — and cybersecurity

Author Q&A: The ongoing role of fortified structures in military clashes — and cybersecurity

There’s no denying that castle walls play a prominent role in the histories of both military defense, going back thousands of years, and — as of the start of the current millennia — in cybersecurity. Related: How Putin has weaponized … (more…) ... Read More
News alert: Aembit, Crowdstrike partner to help companies tighten security of IAM workload access

News alert: Aembit, Crowdstrike partner to help companies tighten security of IAM workload access

| | Steps forward, Top Stories
Silver Spring, Maryland, Jan. 30, 2024 — Aembit, the Workload Identity and Access Management (IAM) platform that enables DevOps and security teams to discover, manage, enforce and audit access between workloads, today announced the availability of a new integration … (more…) ... Read More
DEEP TECH NEWS: Respecting individual rights by using ‘privacy preserving aggregate statistics’

DEEP TECH NEWS: Respecting individual rights by using ‘privacy preserving aggregate statistics’

To sell us more goods and services, the algorithms of Google, Facebook and Amazon exhaustively parse our digital footprints. Related: The role of ‘attribute based encryption’ There’s nothing intrinsically wrong with companies seeking to better understand their customers. However, over … (more…) ... Read More
News alert: NCA’s Data Privacy Week webinars highlight data protection for consumers, businesses

News alert: NCA’s Data Privacy Week webinars highlight data protection for consumers, businesses

| | Top Stories, Uncategorized
Washington D.C. Jan. 22, 2024 – Today, the National Cybersecurity Alliance (NCA), announced the program for its third annual Data Privacy Week campaign, which will take place from January 22nd to January 27th. Throughout the week, NCA will emphasize … (more…) ... Read More
News alert: Sternum and ChargePoint collaborate to enhance ChargePoint Home Flex Security

News alert: Sternum and ChargePoint collaborate to enhance ChargePoint Home Flex Security

| | Uncategorized
Tel Aviv, Israel – Jan. 23, 2024 — Sternum, the pioneer in embedded IoT security and observability, today announced enhanced security for the ChargePoint Home Flex. In a comprehensive research project, Sternum identified a potential vulnerability involving the reverse SSH … (more…) ... Read More
News alert: Deloitte, Memcyco partner to deliver real-time ‘digital impersonation’ solutions

News alert: Deloitte, Memcyco partner to deliver real-time ‘digital impersonation’ solutions

| | For Technologists, Top Stories
New York, NY, Jan. 22, 2024 —  Memcyco Inc, the real-time digital impersonation detection and prevention solution provider, and Deloitte, the leading consulting, advisory, and audit services firm, today announced their strategic partnership in the cybersecurity sector. The … (more…) ... Read More
News alert:  Incogni study reveals overwhelming majority of spam calls originate locally

News alert: Incogni study reveals overwhelming majority of spam calls originate locally

| | Uncategorized
Los Angeles, Calif., Jan. 17, 2024 – Spam calls continue to be a major nuisance in the US, and advice on how to avoid them abound. Incogni’s latest research challenges prevalent assumptions about spam calls, revealing that traditional advice on … (more…) ... Read More