91Ƭ

University 91Ƭers Use AI to Highlight Zoom’s Privacy Risks

University researchers used artificial intelligence in an experiment to determine the extent of privacy risks that come with the use of this web conferencing tool. Publicly...

DeviceLock Acquired by Cyberprotection Vendor Acronis

To bolster and broaden its data privacy capabilities for end users, cyber and data protection vendor Acronis has acquired DLP player DeviceLock. The acquisition aligns with...

Signal Sciences Shows Off Its Next-Gen WAF and RASP at Black Hat 2019

Signal Sciences showed off its award-winning next-gen web application firewall and runtime application self-protection product at Black Hat 2019. It has become one of the...

Address the Root of Your Vulnerabilities in a Resource-Tight Period

Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike....

Microsoft (Finally) Patches DNS Vulnerability CVE-2020-1350

Microsoft has released a patch to address vulnerability CVE-2020-1350, a Windows DNS server remote code execution vulnerability. This vulnerability’s exploit is considered...

CORL Technologies Launches Its Vendor Risk Management Resource Center

Navigating the vendor risk management space, particularly in the current environment that consists of a mix of cloud, managed services, and critical supply chain, is key to...

Webinar: Create a Business-Aligned Information Security Strategy

Organizations need security programs that are holistic, risk-aware, and business-aligned. Watch this webinar to learn how to create a successful security strategy.

Kenna Security Releases Tool for the Custom Benchmarking of Vulnerability Management Programs

On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their...

Alation Launches Active Data Governance

Data intelligence software vendor Alation has made the move to emphasize data governance amongst its solution offerings to make the data catalog a dynamic platform for “a...

CallStranger Vulnerability Affects Billions of IoT Devices

A vulnerability named CallStranger has been discovered, which exploits the Universal Plug-and-Play (UPNP) protocol used by billions of internet-connected devices. These...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us