Date | Title | Description |
01.11.2024 | The Future of Computing: A New Era of Collaboration and Security | In the ever-evolving landscape of technology, partnerships often serve as the bedrock for innovation. Recently, Fujitsu and AMD announced a strategic alliance aimed at creating sustainable computing infrastructures. This collaboration is a ... |
28.10.2024 | OpSys appoints Shanna Daly as first Chief Security Officer | OpSys Australia has announced the appointment of Shanna Daly as its inaugural Chief Information Security Officer.
Based in Sydney, Daly will oversee the company's cyber operations team and services. Her leadership aims to deliver the highes... |
14.11.2022 | Data encryption as a crucial step to manage data access and security | Image: Anthony Brown/Adobe Stock
In a poll of 1,000 business professionals and software developers, nearly 45% say their company has faced a data breach within the last five years. This is no surprise, as data breach reports from Nasdaq sho... |
27.05.2022 | KPMG CEO Reveals Top Focus in 2022 is Cybersecurity | KPMG US Chair and CEO Paul Knop revealed that one of the biggest focus areas for the global accounting firm in 2022 is cybersecurity.
Speaking on which roles within the company are currently in high demand, Knop stated that tech and data sk... |
28.01.2022 | The 'Squid Game' Debacle: How Digital Third Parties Exploit Trends | Chris Olson, Founder and CEO of The Media Trust, is an expert on cybersecurity policy, digital third-party risk and data privacy regulation. |
21.01.2022 | Cybersecurity in 2022 – A Fresh Look at Some Very Alarming Stats | 2022 Text with binary codegetty |
13.01.2022 | As Identity Sprawl Proliferates, A Unified Security Approach Is An Antidote | Bhagwat serves as President and General Manager of Quest’s One Identity Business Unit. |
30.12.2021 | SEGs Are Dead — Long Live Relay-Based Email Security | Rom Hendler is CEO & co-founder of Trustifi, a provider of SaaS-based security and email encryption. |
14.12.2021 | Guardio nabs $47M for an AI-powered browser extension that protects from cyberthreats | Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at the Future of Work Summit this January 12, 2022. Learn more
Web apps are a growing attack vector in the enterprise. According to recent research from Veri... |
14.12.2021 | Guardio nabs $47M for an AI-powered browser extension that protects from cyberthreats | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Web apps are a growing attack vector in the enter... |
22.11.2021 | Securing Manufacturing | The challenges of 2020 were many – none more dramatic than the disruption to consumers daily lives or businesses’ operations because of a cyber-attack or global supply chain issue. In their 2021 Data Breach Investigations Report, Verizon co... |
19.11.2021 | Zero Trust For Zero Sleepless Nights | 3D illustration of the text zero trust over black background with padlock shapes in relief. Concept ... [+] of network security. getty |
28.10.2021 | SlashNext, which uses AI to combat phishing, raises $26M | Phishing, a type of social engineering where an attacker sends a message designed to trick a victim into revealing sensitive information or installing malware or ransomware, is on the rise. According to recent research from Proofpoint, 75% ... |
28.10.2021 | SlashNext, which uses AI to combat phishing, raises $26M | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Phishing, a type of social engineering where an a... |
28.10.2021 | Creating A Security-First Mindset | Global Director of Threat Research Advisory Center at Verizon. |
27.10.2021 | Bringing Cybersecurity To The Forefront Of The Boardroom | Danny Lopez, CEO of Glasswall Solutions, has had a successful international career to date in banking, marketing, diplomacy and technology. |
21.10.2021 | Holistic ransomware protection: NetApp's multilayered solution for a multilayered problem | If ransomware isn't on your concern list, then it will eventually be on your discomfort list. As often stated, it isn't a matter of if, but when a ransomware attack will impact your organization. And that reality may cause a lot of sleeples... |
01.10.2021 | National Cybersecurity Awareness Month: How Security Pros Can Get Involved | Fall is a time defined by yearly rituals. For some of us, that means breaking out our favorite knit sweaters, indulging in pumpkin-flavored everything, or - in the immortal words of George Costanza - "shifting into soup mode."
The... |
17.09.2021 | Aspen Technology : Why the Intelligent Edge Is Important for Successful Industrial AI Deployments | A global survey of 1,500 C-level executives across 16 industries conducted by Accenture revealed the majority of top managers strongly agree that leveraging artificial intelligence (AI) is necessary to achieve their growth objectives, while... |
13.09.2021 | How Likely Is Your Employee To Cause A Data Breach? | Saket Modi is the co-founder and CEO of Safe Security, a Palo Alto-based cybersecurity and digital business risk quantification company. |
10.09.2021 | Security experts predict a global AI-related cyber attack before year-end | As artificial intelligence technologies become more complex and better integrated with new services and products, executives worldwide are concerned about cyber security vulnerabilities. While AI is a strong tool for security, security expe... |
06.09.2021 | Emerging Technologies That Are Disrupting Cybercrime | September 6, 2021 5 min read This story originally appeared on ValueWalk
The struggle to fight against cybersecurity breaches is real. There has been a concerning increase in data breaches of late. Since the onset of the pandemic, the FBI r... |
02.09.2021 | AtoS : Why Financial Services is more vulnerable than ever, and what cyber threats to defend against | While financial services companies have always been a prime target for cybercrime, there are two critical reasons why they are more vulnerable than ever before.
First, financial services companies have dramatically accelerated their digital... |
25.08.2021 | Your Company’s Financial Security Has Never Been More Threatened AND Protected | getty |
23.08.2021 | 4 ways modern technology has changed the online gambling industry | online gambling. Photo by Priscilla Du Preez on Unsplash |
23.08.2021 | 4 ways modern technology has changed the online gambling industry | online gambling. Photo by Priscilla Du Preez on Unsplash
The online gambling industry was established more than two decades ago, and a lot of things have happened since then. Online gambling has changed a lot ever since the rise of the inte... |
16.08.2021 | 3 Ways Healthcare Orgs Can Work to Prevent Insider Security Threats | Sanjay Joshi, Global CIO Healthcare and Life Sciences at Tanium
Though it’s often “highly sophisticated” or “nation-state” attackers that make headlines, the truth is that healthcare’s most overlooked cybersecurity threats are within the IT... |
11.08.2021 | The challenges of securing Active Directory [Q&A] | As we saw in the recent SolarWinds attack, Active Directory can be exploited as a means of attacking corporate networks.
But why is AD such an attractive target? And why are companies struggling to secure it even though it's hardly a new te... |
15.07.2021 | Facebook says Iranian hackers targeted U.S. military personnel | A group of Iranian hackers targeting U.S. military personnel on Facebook, deployed a "well-resourced and persistent operation" to connect with victims on the social media site, and trick them into providing sensitive information a... |
04.07.2021 | iPhone privacy settings: Top tips for securing your iOS device | Because of the evolving nature of the digital threat landscape, constantly evaluating the state of your mobile device security is never a bad idea. New reports from cybersecurity firm Lookout as well as Verizon, for example, reveal a 37% in... |
01.07.2021 | Panzura Helps Hospitals and Healthcare Systems Improve Patient Outcomes, Recover from Ransomware Attacks | Panzura has already saved at least one of our hospital clients when they fell victim to cyberattack.
SAN JOSE, Calif. and ASHBURN, Va. (PRWEB) July 01, 2021
Panzura and Datatility have announced a partnership to help hospitals and healthcar... |
24.06.2021 | Proofpoint : 4 Ways To Prevent Insider Threat Driven Data Leaks | A modern organization's biggest fear around insider threats is data leakage exposing intellectual property, customer information and other regulated data. We see this in the news over and over again; organizations experience data loss in a ... |
23.06.2021 | Employees are valuable assets: Why you need to safeguard them | Image: Luis Alvarez/DigitalVision/Getty Images Must-read security coverage
Best encryption software 2022
The 10 best antivirus products you should consider for your business
8 enterprise password managers and the companies that will love th... |
20.06.2021 | COVID-19, Global Economy, and Its Impacts on Cybersecurity | As a consequence of the coronavirus, over the next three years, the average growth of the global cybersecurity market is expected to slow down to a rate of 6.2% per year, says the Global Cyber Security Market Analysis report released last y... |
16.06.2021 | DEVOTEAM S.A.
Devoteam S A : announces the acquisition of Integrity to boost its Cybersecurity activity and managed services across EMEA | Paris, June 16, 2021 - Devoteam, leading digital consulting firm in EMEA continues to solidify its strategic focus on cybersecurity with the acquisition of Integrity, a cloud-based service platform, expert in Pentesting as a Service (PTaaS)... |
08.06.2021 | The rise of ransomware: How to protect a modern company | In 2021, the cost of ransomware attacks is expected to exceed more than $20 billion worldwide. Ransomware has emerged as one of the most lucrative, elusive, and easy-to-implement methods of cyber-attack currently available. Being able to ho... |
08.06.2021 | Why is Verizon Blocking Pirate Sites Such as NYAA and Mangadex? | A week ago, complaints started pouring in that Verizon is actively blocking pirate sites. The issue was widely discussed on social media as well, where some suggested that pirate site blocking has officially arrived in the US.
At first sigh... |
03.06.2021 | The most destructive cybersecurity threats in 2021 | With companies relying more on technology, such as web applications, third-party solutions, and cloud computing than ever before, corporate cybersecurity has had to become the backbone of modern businesses. In the presence of remote work en... |
25.05.2021 | Qualcomm’s 5G modem for IoT could accelerate mission critical IoT applications | Qualcomm announced the company’s first 5G modem optimized for IoT. The modem, which Qualcomm says was built specifically with enterprise and industrial applications in mind, was designed with an eye toward upgradability and prolonging IoT d... |
19.05.2021 | Cybercrime is thriving during the pandemic, driven by surge in phishing and ransomware | Cybercriminals ransomed millions of dollars from businesses during the COVID-19 pandemic, using time-tested tactics like phishing, social engineering and other hacker tools of the trade.
For companies, the average cost of a data breach soar... |
19.05.2021 | No security experts on staff? You can still have a robust cybersecurity program | Over the last 12 months, you certainly have heard about an increasingly complex and sophisticated barrage of cyber threats. However, if your business has a limited number of IT staff and resources, you may be questioning whether having comp... |
14.05.2021 | How to Develop a Cybersecurity Strategy for Your Online Business | Since the onset of the COVID-19 pandemic, and with the subsequent shift to work and life online, cybercrime has been booming, forming a serious threat to the digital security of businesses.
According to a recent cybersecurity report, cybera... |
14.05.2021 | If We Don’t Secure People, Information Security Will Remain a Pipe Dream | As we’ve written previously on Lawfare, businesses are on the frontline of an intense geopolitical competition. Their assets—like innovative technologies, complex research and development, and data—are being targeted by nation-states. Many ... |
13.05.2021 | COVID-19 leads to a year of cybersecurity challenges | Over the past 12 months, the COVID-19 pandemic has created the perfect environment for cybercrime to flourish, according to Verizon's 2021 Data Breach Investigations Report.
The report analyzed 29,207 quality incidents, of which 5,258 were ... |
12.05.2021 | PROOFPOINT, INC.
Proofpoint : Identify User Risk and Its Impact with Proofpoint Nexus People Risk Explorer | Mitigating risk is every security team's top goal. But prioritizing security alerts and knowing which controls to apply-and to whom-and predicting their impact on risk is challenging. Many organizations take a threat-centric approach to det... |
30.04.2021 | Hackers are attacking the COVID-19 vaccine supply chain | Hackers have targeted companies that distribute the COVID-19 vaccine to a degree previously unreported, according to research from IBM Security.
Starting last year, attackers attempted to access sensitive information about the vaccine's &qu... |
30.04.2021 | Why the CI/CD pipeline is vulnerable to attack [Q&A] | Recent high-profile supply chain attacks such as SolarWinds have highlighted how vulnerable the software development pipeline can be.
To find out more about why the CI/CD pipeline is particularly vulnerable to attacks and what can be done t... |
21.04.2021 | How To Deal With Employees As The New Security Perimeter | Co-founder and CEO, Elevate Security |
16.04.2021 | Enterprise security attackers are one password away from your worst day | Ralph Pisani Contributor
Share on Twitter
Ralph Pisani is president at Exabeam and has 20 years of experience in sales and channel and business development at organizations like Imperva and SecureComputing (acquired by McAfee).
If the defin... |
07.04.2021 | MIMECAST LIMITED
Mimecast : What is Cloud Network Security and How Do You Achieve It? | Cloud network and service providers build cybersecurity into their offerings, but companies need to remain vigilant in vetting, managing and monitoring their use.
Key Points:
On-premises and cloud networks face many of the same security ris... |
28.03.2021 | Execs from Snapchat, Verizon, and other top firms explain how 5G could supercharge their industries | Verizon, AT&T, and T-Mobile all offer 5G coverage across the US. xijian/Getty Images
The rollout of 5G will affect a broad range of industries, including healthcare, AR, and retail.
Execs from Snapchat, Verizon, and other top firms spok... |
28.03.2021 | Execs from Snapchat, Verizon, and other top firms explain how 5G could supercharge their industries | The rollout of 5G will affect a broad range of industries, including healthcare, AR, and retail.
Execs from Snapchat, Verizon, and other top firms spoke to Insider about 5G's potential effects.
They shared their predictions for how the tech... |
26.03.2021 | Keep Your Business Protected With These 10 Privacy Tools, Now on Sale | March 26, 2021 4 min read
Disclosure: Our goal is to feature products and services that we think you'll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce par... |
24.03.2021 | 7 Privacy Trends for Companies to Look Out for in 2021 | 2020 wasn’t a comfortable year for business. Companies worldwide switched to remote working and had to adapt to the new (online) environment. With this transition came an increase in cybercrime issues and data breaches.
In the first half of... |
19.03.2021 | AI Weekly: With RPA on the rise, security challenges remain | Did you miss a session from GamesBeat Summit 2022? All sessions are available to stream now. Learn more.
Robotic process automation (RPA) is experiencing a watershed moment. Gartner estimates that 50% of U.S. health providers will invest in... |
19.03.2021 | AI Weekly: With RPA on the rise, security challenges remain | Join Transform 2021 for the most important themes in enterprise AI & Data. Learn more.
Robotic process automation (RPA) is experiencing a watershed moment. Gartner estimates that 50% of U.S. health providers will invest in RPA over the ... |
03.03.2021 | Identiq raises $47M to verify identities using a cryptographic network | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Identiq, a Tel Aviv, Israel-based identity valida... |
03.03.2021 | Identiq raises $47M to verify identities using a cryptographic network | Join Transform 2021 for the most important themes in enterprise AI & Data. Learn more.
Identiq, a Tel Aviv, Israel-based identity validation startup, today announced it has raised $47 million in series A funding. The company says the fu... |
24.02.2021 | Cybercrime Could Cost the World $10.5 Trillion Annually by 2025 | February 24, 2021 3 min read
Opinions expressed by Entrepreneur contributors are their own.
In a world that is becoming increasingly reliant on technology, cybersecurity is an extremely important priority for entrepreneurs and small and med... |
19.02.2021 | Securing the Future: Cybersecurity Predictions for 2021 | Predictions are always a risky business. Anyone writing this post a year ago could not have seen what was waiting in store in 2020. In cybersecurity, the wholesale shift from the office setting to the virtual workspace has transformed every... |
16.02.2021 | Mobile gaming revenue is under threat from reverse-engineering and other hacks | Join gaming leaders, alongside GamesBeat and Facebook Gaming, for their 2nd Annual GamesBeat & Facebook Gaming Summit | GamesBeat: Into the Metaverse 2 this upcoming January 25-27, 2022. Learn more about the event.
Mobile gaming is boom... |
16.02.2021 | Mobile gaming revenue is under threat from reverse-engineering and other hacks | Did you miss a session from GamesBeat Summit 2022? All sessions are available to stream now. Learn more.
Mobile gaming is boom. 2020 app revenue topped $111 billion, 30% more than all of 2019, according to research firm Sensor Tower. It est... |
03.02.2021 | Conceptualizing the Mandate for the Bureau of Cyber Statistics | As I noted in an earlier Lawfare post (co-authored with Chas Kissick), the Cyberspace Solarium Commission has recommended the establishment of a Bureau of Cyber Statistics (BCS). In our earlier post, Kissick and I reflected on several quest... |
01.02.2021 | Email Phishing Detection And Response Basics: Are SPF, DKIM And DMARC Enough To Protect You? | Cofense VP of Technology Operations & Security |
29.01.2021 | Future Focused: The 2021 Cybersecurity Landscape | Paul Lipman has worked in cybersecurity for 10-plus years. He’s currently CEO of BullGuard, a global leader in consumer and small office security. |
28.01.2021 | Data Privacy Day: 10 experts give advice for protecting your business | Image: iStock/Leestat Must-read security coverage
Best encryption software 2022
The 10 best antivirus products you should consider for your business
8 enterprise password managers and the companies that will love them
Security incident resp... |
27.01.2021 | How To Set Up A Successful Cybersecurity Training Program | CEO of DKBinnovative, a leading managed IT services firm that offers secure, reliable solutions to small and medium businesses globally. |
20.01.2021 | Over a quarter of retail apps have serious security flaws | A side effect of the pandemic over the last year has been that online shopping has boomed. But a new study from Veracode reveals that 76 percent of apps in the retail and hospitality sector contain flaws, with 26 percent having high-severit... |
06.01.2021 | How to find out if your city has 5G right now | Opensignal analyzed 5G users’ experience across three measures: The average speed of the 5G connection when users have an active 5G link, or 5G Download Speed; the time users spend connected to 5G represented by 5G Availability; and the ove... |
31.12.2020 | SMBs: How to find the right MSP for your cybersecurity needs | Image: Kirill_Savenko, Getty Images/iStockphoto Must-read security coverage
Best encryption software 2022
The 10 best antivirus products you should consider for your business
8 enterprise password managers and the companies that will love t... |
30.12.2020 | Five Key Cybersecurity Trends For 2021 | Michelle Drolet is CEO of Towerwall, a highly focused, specialized cybersecurity, cloud & virtual CISO services firm. |
28.12.2020 | Three Sociological Views Of Decentralized Identity | Independent advisor and host of the Nonconformist Innovation Podcast, saving humanity from itself one podcast at a time. |
17.12.2020 | Top Enterprise Collaboration Trends In A Post-Covid World | getty |
16.12.2020 | Social engineering: How psychology and employees can be part of the solution | Image: iStockphoto/BeeBright
There is something those responsible for a company’s cybersecurity must come to terms with: Technology alone is not going to get the job done. It’s time to shift some of the focus from technology to psychology, ... |
08.12.2020 | Passwordless tech startup Beyond Identity raises $75 million | Did you miss a session from GamesBeat Summit 2022? All sessions are available to stream now. Learn more.
Beyond Identity, a New York-based startup developing passwordless identity management solutions, raised $75 million in venture capital.... |
08.12.2020 | Passwordless tech startup Beyond Identity raises $75 million | Beyond Identity, a New York-based startup developing passwordless identity management solutions, raised $75 million in venture capital. The company says the funds will be used to fuel expansion of Beyond Identity’s product capabilities and ... |
16.11.2020 | How To Avoid Holiday Shopping Scams And Keep Your Data Safe | With over two decades in the cyber security industry, Chris Scanlan leads Check Point Americas as its President. |
05.11.2020 | How to defend your organization against social engineering attacks | Image: peshkov, Getty Images/iStockphoto
One of the most effective tactics used by cybercriminals is not technical or even sophisticated in nature. It’s social engineering, specifically an awareness of how to trick and manipulate people int... |
28.10.2020 | The 5 biggest cybersecurity threats for the healthcare industry | Security firm Wandera illustrated the scope and size of healthcare data breaches in a new report about cybersecurity in the healthcare industry.
Image: Wandera
Cloud-first security firm Wandera reports that malicious network traffic is the ... |
26.10.2020 | Women In Finance Share Ways To Reinvent Your Business | Tami Erwin, CEO of Verizon Business, Kathryn Chase, Head of US Small Business Banking at Citibank, ... [+] and Gabrielle Rabinovitch, Vice President of Investor Relations at PayPalVerizon Business, PayPal, Citibank |
26.10.2020 | How To Shore Up Existing Investments To Modernize Information Security | Co-Founder and CEO of ReversingLabs, which helps cybersecurity teams gain insights into malware infected files and objects. |
21.10.2020 | Startups Are Re-Defining Cybersecurity As A Driver For Growth | getty |
07.10.2020 | Verizon Business and Cisco to bring 5G-powered experiences to stadiums | Image: Jim Mahoney/New England Patriots
One of the most significant non-medical consequences of the COVID-19 crisis–and the required masks and social distancing–is the shut-down of event venues, and subsequently, of course, the actual event... |
02.10.2020 | Four steps to securing sensitive data in the cloud | For organizations across the globe, the journey to effectively manage, and extract value from, sensitive data in the cloud isn’t a new one. IT and security professionals have long struggled with challenges to the easy adoption of cloud tech... |
24.09.2020 | Remote Working Solutions To Implement To Secure Every Device | Welcome to 2020 – the year when more businesses than ever before transitioned their employees to remote working. The novel virus Covid-19 changed the workforce for the better and maybe for the worse.
Although many businesses had to adapt ri... |
24.09.2020 | See the pitchdeck that cybersecurity startup Cerby used to land $3.5 million in seed funding to defend against 'shadow IT' and protect social media accounts before the elections | CEO Bel Lepe of Cerby Cerby This story is available exclusively to Insider subscribers. Become an Insider and start reading now.
The startup Cerby is emerging from stealth mode with a $3.5 million seed funding round led by Bowery Capital.
C... |
15.09.2020 | HacWare wants you to hate email security a little less | Let’s face it, email security is something a lot of people would rather think less about. When you’re not deluged with a daily onslaught of phishing attacks trying to steal your passwords, you’re also expected to dodge the simulated phishin... |
06.09.2020 | How AI will automate cybersecurity in the post-COVID world | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
By now, it is obvious to everyone that widespread... |
06.09.2020 | How AI will automate cybersecurity in the post-COVID world | By now, it is obvious to everyone that widespread remote working is accelerating the trend of digitization in society that has been happening for decades.
What takes longer for most people to identify are the derivative trends. One such tre... |
17.08.2020 | Banks’ False Sense Of Cybersecurity Will Be Shattered By Cloud Computing | (Photo Illustration by Budrul Chukrut/SOPA Images/LightRocket via Getty Images)SOPA Images/LightRocket via Getty Images |
12.08.2020 | 5 Ways Machine Learning Can Thwart Phishing Attacks | getty |
10.08.2020 | Ironscales raises $8 million more for AI that thwarts email phishing attacks | Ironscales, a startup developing an AI phishing prevention and detection platform, today closed an $8 million extension to its series B round led by Jump Capital, bringing the total to $23 million. A spokesperson says Ironscales plans to us... |
10.08.2020 | Ironscales raises $8 million more for AI that thwarts email phishing attacks | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Ironscales, a startup developing an AI phishing p... |
24.07.2020 | Companies turning to isolation technology to protect against the internet’s biggest threats | Image: metamorworks, Getty Images/iStockphoto Must-read security coverage
Best encryption software 2022
The 10 best antivirus products you should consider for your business
8 enterprise password managers and the companies that will love the... |
13.07.2020 | Samsung Galaxy XCover Pro: A cheat sheet | Samsung Galaxy XCover Pro
Image: Samsung
Samsung announced in January 2020 the release of a new business-optimized and ruggedized smartphone called the Galaxy XCover Pro to minimal fanfare and only the briefest of mentions in the tech news ... |
07.07.2020 | How COVID-19 changed the future of work | COVID-19 forced businesses across the globe to rapidly adopt remote work in order to adhere to social distancing and stay-at-home orders. For some companies, this transition was seamless, especially those that already implemented cloud and ... |
29.06.2020 | Area 1 Security raises $25 million for AI tools to protect against phishing | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Area 1 Security, a cybersecurity company offering... |
29.06.2020 | Area 1 Security raises $25 million for AI tools to protect against phishing | Area 1 Security, a cybersecurity company offering AI-driven protection against phishing attacks, has raised a $25 million round. A spokesperson said the funding will accelerate R&D and the expansion of Area 1’s go-to-market resources, w... |
22.06.2020 | BlackBerry and Intel Tackle Cryptojacking Malware With New Detection Tool | Software firm BlackBerry and tech giant Intel have joined the fight against crypto-mining malware with the launch of a detection tool for Intel's commercial PCs.
Dubbed the the BlackBerry Optics Context Analysis Engine, the tool utilizes &q... |
16.06.2020 | Los Angeles-based Open Raven raises $15 million from KPCB for its security tech to secure hybrid clouds | Open Raven, the Los Angeles-based security startup founded by a team of cybersecurity veterans from CrowdStrike and SourceClear, has closed on $15 million in new financing only four months after emerging from stealth and in the middle of a ... |