Proofpoint will acquire DSPM startup Normalyze to strengthen its data security offerings across cloud, SaaS and hybrid environments. The company aims to give security teams enhanced visibility, control and human-centric risk reduction for sensitive data across complex infrastructures.
Armis has closed a $200 million Series D funding round on a $4.2 billion valuation to drive growth in cyber exposure management with a focus on acquisitions and federal expansion. CEO Yevgeny Dibrov says the funds will accelerate Armis' work in operational technology and medical device security.
Potential Ukrainian military recruits are being targeted by a "hybrid espionage and information operation" - likely Russian - involving Telegram anti-mobilization messaging and a "Civil Defense" website designed to distribute Windows and Android malware, warns Google's Threat Intelligence Group.
Researchers demonstrated that multiple brands of EV charging stations have vulnerabilities due to manufacturers often leaving open and unsecured SSH and HTTP ports. The risks of these vulnerabilities range from an expanded attack surface to a launching pad for assaults on the power grid.
This 2024 threat-hunting report, highlights the trends observed in the past 12 months. Also, it talks about how to utilize proactive, intelligence-informed threat hunting to relentlessly track, detect, and ultimately disrupt the adversary no matter when or where they operate.
Learn how modern adversaries are...
Showcasing the latest innovations in hardware security, experts from more than 100 companies worldwide have gathered this week at Hardwear.io in Amsterdam. The annual event and hardware hackathon examines current and future challenges and solutions in hardware security.
As Cylance continues to incur significant losses, BlackBerry is reallocating resources toward its more promising QNX and secure communications teams. The company expects its cybersecurity unit to stabilize and become profitable by the end of the fiscal year, thanks to strategic bets and cost cuts.
In the latest weekly update, ISMG editors discussed the strategic convergence of data security posture management and data loss prevention technologies, evolving priorities of security leaders and the urgent readiness challenges posed by the NIS2 Directive.
With the $162 million buy of Trail Security, Cyera will offer customers AI-enhanced data loss prevention alongside its DSPM solution. The new platform promises stronger, real-time data protection for sensitive information both in motion and at rest, helping enterprises meet security demands.
A new variant of an Android banking Trojan called TrickMo is tricking victims into providing their phone unlock code, enabling hackers to sustain operations, warn cybersecurity researchers. The malware displays presents a deceptive HTML user interface that mimics the device's actual unlock screen.
Take a few minutes to read “The Healthcare CISO’s Guide to Medical IoT Security.” It’s a valuable piece for information on the connected medical device landscape and the ways that Zero Trust provides a reliable defense against known and unknown threats.
See how Zero Trust delivers a security framework for...
Frost & Sullivan has named us a Leader in both growth and innovation in the latest Frost Radar™ on Healthcare IoT Security in the United States, 2023 report. This report summarizes their independent evaluation of key vendors in IoMT cybersecurity.
Palo Alto Networks Medical IoT Security is committed to helping...
Netskope’s purchase of Dasera enhances its data security posture management capabilities, enabling customers to secure both structured and unstructured data across cloud and on-premises environments. The integration will offer a platform for holistic data protection and security posture management.
AI PCs are expected to make up 43% of all PC shipments by 2025, from 17% in 2024. The demand for AI-powered laptops is forecast to outpace that for desktops, and by 2026, AI laptops will be the "only choice of laptop available to large businesses."
The rapid proliferation of IoT devices introduces significant security risks that require CISOs and top corporate leaders to step up, reduce risks and align IoT security with mission-critical objectives.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.