Prophet Security: Alert Investigation and Response Times
Prophet Security, an agentic AI SOC platform provider, released its inaugural State of AI in SecOps 2025 Survey Report.
Based on the findings from this survey,...
Cybrary Lands $25 Million in New Funding Round
Cybrary, announced it has secured $25 million in a Series C funding round led by current investors, BuildGroup and Gula Tech Adventures. This latest investment brings...
Orchid Security: Opportunities in the Identity Security Market
Orchid Security recently announced the appointment of Trish Cagliostro as Chief Revenue Officer. Trish is best known for building the global partner org at Wiz,...
Canadian companies rank among the top 10 in client data leaks
An interesting study from NordPass shows that Businesses in Canada have leaked consumers’ data more than most other countries, reveals the latest research by NordPass. Since...
Acronis and Lifeboat Distribution Rejoin Forces in Meeting the Growing Demand...
Lifeboat will offer the full range of Acronis’ data protection solutions and local support to its network of value-added resellers, system integrators, and managed...
Aryaka Delivers Industry’s First Zero Trust WAN Based on Unified SASE...
Aryaka the leader in SASE solutions, announced the next evolution of its Zero Trust WAN with the inclusion of Secure Web Gateway and Firewall-as-a-Service. ...
Kaspersky finds cybercriminals stealing guests’ credit card data from hotels worldwide
In a research of the RevengeHotels, conducted from Kaspersky has confirmed that over 20 hotels in Latin America, Europe and Asia have fallen victim...
Best Practices for Protecting Mobile Devices
JT Keating, SVP Strategic Initiatives of Zimperium, provided insights into the attack vectors on mobile devices, including malicious apps, network exploits, and phishing, and...
RunSafe Security: Cyber Resilience and Energy Infrastructure in the Age of...
Joe Saunders, CEO of RunSafe Security, detailed how his firm protects critical infrastructure by immunizing software against memory-based exploits. He highlighted the strategic importance...

















