Security
Group-IB identifies exposed public-facing databases in 2021
Group-IB carried out a deep dive into exposed digital assets discovered in 2021. During the research, Group-IB’s Attack Surface Management team analyzed instances ...Cybereason launches Digital Forensics Incident Response
Cybereason, the XDR company, has launched Cybereason DFIR (Digital Forensics Incident Response), a solution designed to automate incident response (IR) investigations by ...Sophos acquires SOC.OS
Sophos, next-generation cybersecurity, announced that it has acquired SOC.OS, an innovator of a cloud-based security alert investigation and triage automation solution. The ...Fortinet releases FortiOS 7.2
Fortinet, broad, integrated, and automated cybersecurity solutions, announced the release of FortiOS 7.2, the latest upgrades to its flagship operating system and ...Yotta partners with Virsec
Yotta has announced its partnership with Virsec, through which enterprises across India that are either hosted at Yotta data center or their ...GBM reveals insights from 9th edition of cybersecurity report
Gulf Business Machines (GBM) revealed top insights from the 9th edition of its cybersecurity report where it explored the growing significance of ...76% of organizations suffered downtime and data loss in 2021
Acronis has released its annual Cyber Protection Week Global Report 2022 timed to this year’s World Backup Day. The report which surveyed over ...ESET refreshes product portfolio
ESET, cybersecurity, has announced a refresh of its line of business products to help organizations of all sizes prevent cybercriminals from playing ...Check Point Software recognized in G2 Grid Report
Check Point Software Technologies, a provider of cyber security solutions globally, announced that G2, the world’s largest and most trusted software marketplace, ...Qualys delivers Multi-Vector EDR 2.0 with enhanced prioritization
Qualys, a provider of disruptive cloud-based IT, security and compliance solutions, has announced Multi-Vector EDR 2.0 with additional threat-hunting and risk mitigation ...


















