Palo Alto Networks has launched a new, fully managed “next-generation” firewall service in partnership with Amazon Web Services.
Authenticate continues to vex security leaders as businesses become more digitised, agile and dependent on remote employees.
ServiceNow has added new features to its Major Security Incident Management (MSIM) Workspace platform, which it launched in December 2021.
Lightstep Incident Response gives devops teams access to observability tools to determine the root cause of incidents via a self-service portal.
The government warning renews global concerns about using Russian-made software as the country continues its assault on Ukraine.
The lawsuit accuses Trend Micro of using Webroot's patented malware detection, network security, and endpoint protection technologies without authorisation.
The Ukraine-Russia conflict has raised the question of whether organisations should stop using Russian-made security and tech products.
Security researchers discover a new reflection / amplification DDoS vulnerability used to launch multiple, high-impact attacks against Mitel systems.
Since Russia launched a full-scale military invasion into Ukraine on February 23, a series of cyber attacks have been detected targeting Ukraine.
A new data wiper malware campaign has been detected targeting organisations in Ukraine amid escalating Russian military conflict in the nation.
New support for Amazon EKS enables partners to scale back ups rapidly without complex scripting and removes need to bolt together multiple solutions.
Researchers, academics, and enthusiasts can now contribute to and benefit from free, open source security data on software supply chain vulnerabilities.
A claimed first-of-a-kind quantum key distribution network offers 800 Gbps encryption under real-world environmental conditions.
SAP ICM vulnerability allows theft of credentials and session information, which can be used to launch ransomware and steal sensitive data.
A new report discovers edge network definitions are in flux across industries as organisations look to augment traditional security controls to address edge network risks.