Cisco has released its predictions for what 2021 will hold for the privacy and cybersecurity landscapes. According to the report, as companies look to transition to a new normal in 2021, the pandemic has put Chief Information Security Officers (CISOs) front and center of their organisations’ path forward.Read More…

Sophos has today published the Sophos 2021 Threat Report, which flags how ransomware and fast-changing attacker behaviours, from advanced to entry-level, will shape the threat landscape and IT security in 2021. The report, written by SophosLabs security researchers, as well as Sophos’ threat hunters, rapid responders, and cloud security andRead More…

SentinelOne today announced it has been named one of the fastest-growing companies in North America, according to the Deloitte Technology Fast 500. Deloitte’s Technology Fast 500 recognizes the 500 fastest growing technology, media, telecommunications, life sciences and energy tech companies in North America. According to Deloitte, SentinelOne hasRead More…

In the era of the coronavirus pandemic, digital transformation, and cloud security (79%) are the chart-topping topics enterprises want to know more about. They are followed by threat and vulnerability research (62%), and risk and compliance (49%), as shown by a pre-event survey of 2,064 business and IT decision-makers acrossRead More…

Mimecast today announced it has joined the CrowdStrike Elevate Partner Program, an elite cybersecurity ecosystem delivering solutions and expertise to stop breaches. Through Mimecast partnering with CrowdStrike, customers can better defend against threats at the perimeter, inside an organization and beyond, improving an organization’s overall security posture.Read More…

LogRhythm has launched reporting capabilities and compliance use cases that make it simple and efficient to comply with the Kingdom of Saudi Arabia’s (KSA) Essential Cybersecurity Controls (ECC). It enables organizations of all kinds to use one-click, out-of-the-box automation to meet the minimum cybersecurity requirements for information and technologyRead More…