Category

Security

Category
Exertis Cybersecurity, distributor of cybersecurity solutions, announced its collaboration with Object First, the developer behind Ootbi. Security

Exertis Cybersecurity, a leading distributor of cybersecurity solutions, has announced its collaboration with Object First, the developer behind Ootbi (Out-of-the-Box-Immutability), a groundbreaking ransomware-proof backup storage appliance tailored for Veeam®. This partnership signifies a significant stride in Exertis Cybersecurity’s mission to furnish cutting-edge cybersecurity solutions to organizations across Europe.

Nord Security unveiled NordStellar, a threat exposure management platform designed to detect and combat cyber threats effectively. Security

Nord Security, a leading cybersecurity firm renowned for its VPN solution NordVPN, has unveiled NordStellar, a cutting-edge threat exposure management platform designed to empower businesses in detecting and combating cyber threats effectively. Developed by the same team behind NordVPN, NordStellar aims to revolutionize enterprise cybersecurity by offering comprehensive protection against data breaches, fraud, ransomware attacks, and unauthorized access.

A recent report from Verizon Business has highlighted a significant surge in cyberattacks driven by the exploitation of vulnerabilities. Security

A recent report from Verizon Business has highlighted a significant surge in cyberattacks driven by the exploitation of vulnerabilities, accounting for 14% of all breaches in 2023. The report, titled the Data Breach Investigations Report (DBIR), analyzed a record-high 30,458 security incidents and 10,626 confirmed breaches last year, marking a two-fold increase compared to 2022.

The UK government rolled out stringent regulations requiring manufacturers of internet-connected devices to adhere to security standards. Security

In a significant move aimed at bolstering cybersecurity across the country, the UK government has rolled out stringent regulations requiring manufacturers of internet-connected devices to adhere to minimum-security standards. The new laws, part of the Product Security and Telecommunications Infrastructure (PSTI) Act 2022, are designed to mitigate the risks posed by weak security features on smart gadgets.

LogRhythm, the company helping security teams stop breaches, is holding its revamped cybersecurity summit, RhythmWorld Europe. Security

LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, is holding its revamped cybersecurity summit, RhythmWorld Europe, to elevate cybersecurity collaboration. RhythmWorld Europe will bring together industry experts and professionals to share key knowledge to overcome the most pertinent modern threats. The summit returns for a second year following its successful European launch in 2023 and will take place on 30th April 2024 at CodeNode, London.

Recent global research reveals 61% of organizations still rely on manual and time-intensive methods for sharing security status updates. Security

Recent global research reveals 61% of organizations still rely on manual and time-intensive methods for sharing security status updates. In response, LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced its 8th consecutive quarterly release. The latest innovations to LogRhythm Axon facilitate seamless dashboard and search import/export to community repositories, bridging the communication gap.

A report from Cisco reveals that only 3% of organizations possess the necessary level of readiness to combat cybersecurity risks effectively. Security

The latest report from Cisco (NASDAQ: CSCO) reveals a stark reality: only a mere three percent of organizations worldwide possess the necessary level of readiness to combat modern cybersecurity risks effectively. Released today, the 2024 Cybersecurity Readiness Index underscores a notable decline from the previous year, where 15% of enterprises were classified as mature in their cybersecurity readiness.