Cybersecurity






Siemplify, the leading independent provider of security orchestration, automation and response (SOAR) has released a new version of its security operations platform. “Version 5.0 continues to raise the bar for end-to-end security operations management, adding new capabilities that make security analysts more productive, security engineers more effective and SOC managers more informed […]

Siemplify Enhances Security Operations Platform


New Study Underscores the Need for Affordable, Accessible Security Solutions SolarWinds, a leading provider of powerful and affordable IT management software has released findings from a new IDC® White Paper, Affordable Tools and Shared Responsibilities Define Midmarket IT Security Trends, sponsored by SolarWinds.The white paper is based on a survey of both IT […]

SolarWinds Finds Insider Threats Cited as Leading Cause of Security ...


An announcement by A10 Networks today has all the indicators of a significant improvement in what is now possible for DDoS defense capabilities. Noting that the time is now for DDoS defense to bring its ‘A’ game, A10 Networks announced it is adding Zero-day Automated Protection (ZAP) capabilities to its […]

DDoS Defense Steps Up A Notch



As you are likely aware by now, Quest Diagnostics – one of the biggest blood testing providers in the country – warned Monday that nearly 12 million of its customers may have had personal, financial, and medical information breached due to an issue with one of its vendors. This kind […]

Quest Diagnostics Breach – What the Experts are Saying



A massive database containing the contact information of millions of Instagram influencers, celebrities, and brand accounts has been exposed online. The database, hosted by Amazon Web Services, was left without a password allowing anyone to look inside.  It is thought that the database has over 49 million records. Discovered by […]

Instagram Influencers Account and Contact Information Exposed – What the ...



The industries most anticipated and most comprehensive report covering data breaches has been released in its 2019 edition.  This year the report is nearly 80 pages and includes contributions from 73 contributing organization.  This report is built upon the analysis of 41,686 security incidents, of which 2,013 were confirmed data […]

2019 Data Breach Investigations Report – See reactions and get ...



Cloud-based applications are becoming commonplace and bring with them a host of benefits for both user and developer.  Cloud applications can be updated, tested, and deployed quickly, providing enterprises with the agility needed to compete in today’s business environment.  Cloud-based applications don’t come without additional risk, however.  For a cloud-based […]

Runtime Encryption – What You Need To Know