News
New in Syteca Release 7.21: Agentless Access, Sensitive Data Masking, And Smooth...
Syteca 7.21 is a major update designed to enhance user privacy, simplify access management, provide seamless oversight, and improv...
3 Weeks Left Until The Start Of The OpenSSL Conference 2025
The OpenSSL Conference 2025 will take place on October 7 – 9 in Prague. The program will bring together lawyers, regulators, devel...
Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike...
Seraphic’s Secure Enterprise Browser (SEB) solution is now available for purchase in the CrowdStrike Marketplace. The release deli...
3 Cybersecurity Challenges to Solve Before Drone Delivery
Whether you're excited for delivery drones or think they're dystopian, companies like Amazon continue experimenting with them. Bef...
Identity Governance and Administration Projects Are Never Done – But Can Get Muc...
Identity & Access Management efforts are difficult but crucial. We present a variety of considerations to help increase speed and...
Kikimora Announces Launch of Kikimora Agent: Accessible AI-Powered Cybersecurity...
Kikimora Agent is a new AI-powered platform providing accessible cybersecurity management, vulnerability detection, and asset moni...
Agentic AI Are Cybersecurity Nightmare You Can't Ignore
Agentic AI is revolutionizing cybersecurity, impacting both offensive and defensive strategies. Key concerns involve risks like in...
Link11 Reports 225% More DDoS Attacks In H1 2025 With New Tactics Against Infras...
Documented attacks targeting the Link11 network increased by 225% compared to the same period in 2024. The longest documented atta...
Sendmarc Appoints Rob Bowker As North American Region Lead
Rob Bowker will oversee regional expansion with a focus on growing the Managed Service Provider (MSP) partner community. Bowker br...
Why Businesses Should Focus on Cyber Resilience Instead of Cyberattack Preventio...
You can’t stop every attack — but you can control how you recover, Andrey Leskin, CTO of Qrator Labs explains.
Legacy Systems and CVEs: The Unseen Threat to Ghana's Digital Landscape
Security researcher based in Accra, Ghana, has been analyzing Ghana's web infrastructure. He uncovered a pattern that was both con...
Bug Bounties: Crowdsourcing Security at Scale
Everything you ever wondered about bug bounties but were afraid to ask.