Get expert insights on the latest developments in cybersecurity to stay ahead of the curve.
Much like the rest of technology, merger and acquisition (M&A) activity for cybersecurity companies has been in a slump this year. There are a number of reasons why that won’t last, but still, the decline has been noteworthy. For the first seven months of this year, there were a mere 34 startups that got acquired,… Read more
Older unpatched vulnerabilities make hackers’ work easier: They can keep running tried-and-true exploits and just look for new victims. Unfortunately, the theme for this week is returning vulnerabilities, or ones that haven’t been excised quite yet. Some exploits and weaknesses have had fixes for months or longer, yet they keep showing up in the news,… Read more
Combining cloud workload protection and cloud security posture management functions, CNAPPs are making cloud security much easier to manage. Read more
SandboxAQ today introduced an open-source cryptography management framework built for the post-quantum era. The AI and quantum spin-out from Alphabet uses the Sandwich framework for its SandboxAQ Security Suite, currently used by several U.S. government agencies, global banks, telcos, and tech companies. The framework is designed to simplify cryptography management and give developers greater observability… Read more
The U.S. Securities and Exchange Commission this week announced new rules mandating the disclosure of cybersecurity incidents as well as ongoing risk management, strategy, and governance. The rules, which will become effective 30 days after publication, require public companies to disclose any cybersecurity incident they determine to be material within four business days, detailing its… Read more
Cybersecurity startups had been pretty resilient despite the downturn in venture capital funding, but that run has ended in recent months. Venture investments in cybersecurity startups in the second quarter plunged 63% to $1.6 billion, according to data from Crunchbase. Funding was down 40% sequentially from the first quarter, and was the lowest since the… Read more
NIST is falling behind on FIPS 140-3 certifications and post-quantum cryptography, and the results could be disastrous for cybersecurity. Read more
We have provided everything you need to create a vulnerability management policy for your organization. Download the template now. Read more
IT security policies are essential to get right. Discover their importance and benefits. Learn best practices for safeguarding your organization’s network. Read more