Armis expands vulnerability exposure and assessment capabilities

Armis is stepping up its game in cybersecurity with the launch of its free Armis Vulnerability Intelligence Database. This community-driven database offers real-time insights on exploited vulnerabilities and emerging threats, helping organisations to better prioritise and mitigate risks swiftly. Source: Help Net Security Key Points The Armis Vulnerability Intelligence Database integrates AI insights and exploited […]

Read More →

Cynomi cinches $37M for its AI-based ‘virtual CISO’ for SMB cybersecurity

Cynomi has secured $37 million in funding for its innovative cybersecurity solution designed for small and medium-sized businesses (SMBs). The company, co-led by Insight Partners and Entrée Capital, aims to provide businesses with an intelligent solution to tackle rising cyber threats through its AI-based “virtual CISO”, which offers scalable security operations support. Source: Article URL […]

Read More →

Five Ways CISOs Can Unlock Board Buy-In

As cybersecurity continues to dominate the conversation in boardrooms, CISOs are finding new ways to align their strategies with business objectives. Roi Cohen outlines five impactful strategies for CISOs to secure board support effectively, highlighting the importance of business-oriented communication in the cybersecurity landscape. Source: Forbes Key Points Understanding the language of the board is […]

Read More →

AI Cyber Threats Put Consumers’ Trust In Banks At Risk

In an era where AI is revolutionising banking, it also introduces significant cybersecurity risks for banks, jeopardising consumer trust. With threats like deepfake scams and AI-generated malware on the rise, financial institutions find themselves in a precarious position as they race to protect their customers from fraud. Source: Forbes Key Points Banks are adopting generative […]

Read More →

Complaints about ransomware attacks on US infrastructure rise 9%, FBI says

Ransomware complaints have surged in the US, climbing 9% from the previous year, with notable implications for critical infrastructure. This increase, highlighted in a recent FBI report, underscores the growing cyber threat landscape, particularly for sectors vital to national security and public health. Key Points Ransomware emerged as the top cyber threat to critical infrastructure […]

Read More →

Seasoned Technology and AI Partner Joins Dentons’ Privacy and Cybersecurity Team in Maine

Summary Dentons has announced the addition of Andrew Clearwater to its privacy and cybersecurity team in Portland, Maine. Clearwater joins from OneTrust, a prominent security software provider. His expertise is expected to bolster Dentons’ capabilities in navigating the intricate landscape of privacy and cybersecurity law. Source: Cybersecurity Law Report Key Points Andrew Clearwater joins Dentons […]

Read More →

The Keys To Strong Identity Life Cycle Management

Organisations are increasingly recognising the importance of effective identity life cycle management (ILCM) as they navigate the complexities of modern business environments. The article discusses the critical role ILCM plays in enhancing security, compliance, and operational efficiency, making it essential reading for anyone involved in enterprise cybersecurity or data governance. Source: Article URL Key Points […]

Read More →

Google, University of Arizona support Chandler Unified schools’ cybersecurity clinic

Chandler Unified School District has launched a cutting-edge cybersecurity clinic aimed at equipping high school students with essential skills in the rapidly growing field of cybersecurity. Supported by Google and the University of Arizona, the clinic enables students to receive Google’s cybersecurity certification and a micro-credential from the University of Arizona, thus bridging the experience […]

Read More →

Socket Acquires Coana To Build Out Its SCA Capabilities

Socket has officially acquired Coana, a cybersecurity start-up, to enhance its software composition analysis (SCA) capabilities. This acquisition aims to address the risks associated with integrating open-source code by better identifying potential vulnerabilities in software applications. Source: Forbes Key Points Socket focuses on software composition analysis to identify vulnerabilities in open-source code. The acquisition of […]

Read More →