Security Technology & Operations

Global Security Information and Event Management Market Size Is Expected to Reach $6 Billion by 2026

KBV Research released its Global Security Information and Event Management (SIEM) Market Forecast report last month. In light of the recent COVID-19 pandemic, the SIEM...

Two New Zoom Vulnerabilities Uncovered – Upgrade Now!

Two new vulnerabilities in Zoom’s web conferencing software were discovered in early June 2020. The vulnerabilities could allow malicious actors the ability to execute...

CASB Vendors Up Their Threat Protection Game With Big-Name Threat Intelligence Collaborations

CASB vendors CipherCloud and Bitglass have both recently announced partnerships with big-name cyber threat intelligence (CTI) providers to improve the threat protection...

Making Sense of SIEM Pricing: Pricing by Data Volume

As the Security Information and Event Management (SIEM) market continues to grow, organizations now have more options than ever to decide which SIEM is right for them....

Acronis Cyber Protect Cloud Turns Managed Service Providers Into Managed Security Providers

More than ever, cybersecurity solutions are core to any MSPs offering. No longer should technology service providers be farming this out to dedicated security providers....

New York State Leads the Charge in Upcoming Zoom Security Enhancements

The Office of the Attorney General of the State of New York has reached a settlement with Zoom Video Communications. The agreement promises enhanced data security and...

StorMagic – The Magic Bullet for Key Management?

With its announcement of SvKMS, StorMagic, known for leading-edge storage solutions, has officially entered the security marketplace. SvKMS provides key management for...

Rapid7 Penetration Tests Show That Businesses Are Getting Better at Network Security

We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at...

IBM Zero-Day Vulnerabilities Leave Enterprises Open to Remote Execution Attacks

Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company...

Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?

The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for...
Visit our IT Crisis Response Resource Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us