NetWitness has recently announced NetWitness XDR, a family of products and capabilities delivering comprehensive detection and response on premise, in the cloud or as a hybrid of the two. This new offering and product architecture delivers the full range of deployment options enterprises seek today to meet their unique cybersecurityRead More…

Global software and technology leader Emerson and Nozomi Networks, the leader in OT (operational technology) and IoT (Internet of Things) security, have announced they have established an agreement to meet growing demand for OT cybersecurity services and solutions in the specific industries both companies serve. Emerson will offer Nozomi Networks’Read More…

Enterprises that are considering joining the metaverse bandwagon have been put on high alert against imminent cyberattacks that could expose their valuable data to crippling cyberattacks, data exfiltration and breaches. As brands get increasingly engulfed in the metaverse, largely driven by the exciting opportunities that this relatively new digital conceptRead More…

The combined zero-trust authorization approach to security improves customers’ identity security posture for privileged identities and entitlements for cloud and SaaS applications Delinea, a leading provider of privileged access management (PAM) solutions for seamless security, and Authomize, a leading provider of Cloud Identity and Access Security, have announced a strategicRead More…

BeyondTrust has announced the release of BeyondTrust Remote Support 22.2. This release builds upon the existing Microsoft Teams integration, introducing 1:1 screen sharing from a Teams chat, multi-portal support, custom greetings, and instance customization for Remote Support users. In addition, a new Remote Support External Jump Groups integration with BeyondTrustRead More…

ESET researchers have discovered a previously unknown macOS backdoor that spies on users of compromised Macs and exclusively uses public cloud storage services to communicate back and forth with its operators. Named CloudMensis by ESET, its capabilities clearly show that the intent of the operators is to gather information fromRead More…