iiDENTIFii achieves certification to ISO/IEC 27001:2022 Information Security Management Systems
DENTIFii, Africa’s leading provider of enterprise-grade biometric Identity Verification (IDV) solutions, has been certified ...
DENTIFii, Africa’s leading provider of enterprise-grade biometric Identity Verification (IDV) solutions, has been certified ...
Microsoft has unveiled a new feature to improve the accuracy of its threat detection services. As announced in a recent entry ...
In a job market known for its talent shortage and skills gap, the shift to AI-based solutions represents both an opportunity and a call to action. While AI can tackle grunt work with remarkable accuracy, it also demands a new set of skills from the cybersecurity workforce.
Amex GBT CISO David Levin is accelerating AI security, cutting false positives and speeding SOC response to anticipate and shut down threats.
One of these is Google Unified Security, a converged AI-powered solution encompassing all of Google’s capabilities. This ...
BUFFALO, N.Y., April 14, 2025--CTG, a Cegeka Group company (the "Company") and a leader in digital transformation and IT solutions, announced the launch of new cybersecurity solutions and expansion of the Cegeka Modern SOC (Security Operations Center) network to the U.S. to strengthen cyber resilience and minimize the impact of increasingly prevalent cyber threats and disruptions.
Health Care Cybersecurity Call | April 10, 2025
Slides: https://www.cesa.org/wp-content/uploads/ESTAP-cybersecurity-webinar-4-1-25-slides.pdf Energy storage systems play a key role in the stability and reliability of modern power grids. As energy storage systems become more widespread and essential, protecting them against cyber threats has become increasingly important. In this webinar, industry experts will provide an “Energy Storage and Cybersecurity 101” and overview the current landscape for cyber security considerations for energy stor
Palo Alto Networks (NasdaqGS:PANW) saw its share price increase by 10% over the past week, coinciding with significant corporate developments. The company's recent multiyear partnership with the National Hockey League aims to fortify cybersecurity across the league, potentially enhancing the company's market position. As the broader technology sector experienced mixed results amid relief from tariff exemptions, Palo Alto Networks' robust performance aligns with a general market uplift, which...
Cybersecurity stocks have not been immune from the recent market sell-off, opening up some attractive entry points for some ...
🔐 Want to protect your internet from hackers and freeloaders? In this quick tutorial, you'll learn exactly how to secure your Wi-Fi network in under 5 minutes — no tech skills needed! Whether you're working from home 🧑💻, streaming movies 🎬, or shopping online 🛒, your Wi-Fi network must be safe and private. In this video, we cover the most effective Wi-Fi security tips to lock down your connection fast: ✅ Change your default router username & password ✅ Enable WPA2 or WPA3 encryption for maximu
EncryptHub, a notorious threat actor linked to breaches at 618 organizations, is believed to have reported two Windows zero-day vulnerabilities to Microsoft, revealing a conflicted figure straddling the line between cybercrime and security research.
Vulnerable Log4j code can be found in products from identity vendors like CyberArk, ForgeRock, Okta and Ping Identity, as well as SMB-focused security companies like Fortinet, SonicWall, and Sophos.
A sophisticated APT tracked as ToddyCat has exploited an ESET DLL search order hijacking vulnerability for malware delivery.
The discovery of the Invisible 'Rules File Backdoor' exposes severe supply chain risks for millions of developers relying on AI-assisted coding tools, potentially compromising software ecosystems worldwideTEL AVIV, Israel, March 18, 2025 (GLOBE NEWSWIRE) -- Pillar Security, a pioneering company in AI security, discovered a significant vulnerability affecting GitHub Copilot and Cursor - the world's leading AI-powered code editors. This new attack vector, dubbed the "Rule Files Backdoor," allows a
Seemplicity, the cybersecurity company behind the market-leading vulnerability and exposure management platform that is transforming how security teams reduce risk, today announced a major product release. This latest version of the Seemplicity Platform introduces powerful new AI-driven capabilities designed to streamline and scale remediation operations. Two major new features - called "Find the Fixer" and "Automatic Scoping" - reduce remediation chaos by eliminating manual bottlenecks and sign
Cybersecurity minister Feryal Clark said Britain’s IT security has been behind the EU for years - and new laws to fill the ...
A relatively new cyber threat, “Quishing”, or QR code phishing is claiming more victims in the UK than ever, with Action ...
The SMSF Association has told trustees to remain alert and proactive in safeguarding their funds’ security in the wake of recent cyber attacks on some large APRA-regulated super funds.
Noting that cyber attacks usually occur when people are on vacation or relaxing, the Commission on Elections (Comelec) is ...