According to the latest industry data released today from Veeam® Software, almost half of global organizations are being hindered in their digital transformation journeys due to unreliable, legacy technologies with 44% citing lack of IT skills or expertise as another barrier to success.
For the past 20 years, Justin Dolly, new CSO at Sauce Labs, has been leading security at public and private companies. Over the years, how has he built security teams and played a key role in risk management, security engineering and operations and compliance initiatives at the many companies he has serviced?
Myrna Soto has joined Forcepoint as Chief Strategy and Trust Officer. In this newly-created role, Soto will serve as a strategic business and technology driver of the company’s enterprise vision, strategy and programs to protect people, critical data and IP both within the company and for thousands of Forcepoint customers around the globe.
A judge in the U.S. District Court of the Eastern District of Virginia has ruled that Capital One must allow plaintiffs to review a cybersecurity firm’s forensic report related to the bank’s 2019 data breach. Capital One sought to keep the report private on the grounds that it is a protected legal document.
Joomla, a free and open-source content management system for publishing web content, developed by Open Source Matters, Inc., has disclosed a data breach which affects 2,700 individuals.
Led by Noam Rotem and Ran Locar, vpnMentor’s research team discovered a massive amount of incredibly sensitive financial data connected to India’s mobile payment app Bharat Interface for Money (BHIM) that was exposed to the public.
vpnMentor's research team, led by Noam Rotem and Ran Locar, discovered a data breach belonging to the Spanish e-learning platform 8Belts, affecting 150,000s of people across the globe.
The Cybersecurity and Infrastructure Security Agency (CISA) released the first in a series of six Cyber Essentials Toolkits - a starting point for small businesses and government agencies to understand and address cybersecurity risk as they do other risks.
The best UES solution is one that buttresses its capabilities by simplifying administration, increasing visibility and control, reducing costs and eliminating unnecesary friction all while providing a higher value of security, productivity and user experience.