Tag: technology
-
Corr-Serve strengthens South Africa’s cybersecurity market through expanded Seceon partnership
Corr-Serve, a South African value-added distributor of cybersecurity solutions, has strengthened its long-standing partnership with Seceon, a global provider of advanced cybersecurity technology, expanding local access to AI-driven threat detection and response capabilities. The enhanced agreement builds on more than seven years of collaboration between the two companies in Southern Africa and positions Corr-Serve as Seceon’s…
-
NETSCOUT recognized for leadership in network detection and response
Tags: attack, cloud, cyber, data, detection, infrastructure, intelligence, Internet, network, risk, service, technology, threat, toolThis is where visibility breaks down.This is where attacks hide.This is where risk grows quietly.NETSCOUT’s Omnis Cyber Intelligence closes this critical gap with a simple yet powerful idea: If you can’t see every signal, you can’t trust any conclusion. Turning packets into understanding: Our proprietary Adaptive Service Intelligence (ASI) technology doesn’t just collect packets; it…
-
NHS Issues Open Letter Demanding Improved Cybersecurity Standards from Suppliers
Open letter by NHS technology leaders outlines plans to identify risks to software supply chain security across health and social care system First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/nhs-open-letter-demands-improved/
-
More than half of former UK employees still have access to company spreadsheets, study finds
More than half of UK employees retain access to company spreadsheets they no longer need, leaving sensitive business data exposed long after people change roles or leave organisations, according to new research from privacy technology company Proton. The study, based on a survey of 250 small and medium-sized businesses (SMB) in the UK, found that…
-
How to scale NHIs safely and efficiently?
Is Your Organization Ready to Scale NHIs Safely and Efficiently? Scaling Non-Human Identities (NHIs) is a complex endeavor, particularly in dynamic industries such as financial services, healthcare, and technology-driven sectors that rely heavily on cloud computing. Where NHIs serve as the backbone for automation, the question becomes: how can organizations use NHI management to achieve……
-
JA3 Fingerprinting Tool Exposes Attackers’ Infrastructure
JA3 fingerprinting, long dismissed as outdated technology, is experiencing a resurgence as security teams discover its practical value in identifying and tracking malicious infrastructure with surprising precision. Despite widespread skepticism about JA3’s relevance fueled by frozen public databases and inconsistent threat intelligence updates the indicator remains a powerful asset for SOC and threat hunting teams.…
-
NSFOCUS Enters the Global Top Tier of DDoS Security: NSFOCUS DDoS Solutions Positioned in the MarketsandMarkets Star Quadrant
SANTA CLARA, Calif., Jan 21, 2026 Recently, MarketsandMarkets, a globally recognized market research and consulting firm, released its Global DDoS Protection and Mitigation Security Market Global Forecast to 2030 report, providing a comprehensive assessment of industry trends, technology evolution, and leading vendors worldwide. Based on its mature technology stack, comprehensive solution portfolio, and strong market…The…
-
How are non-humans identities protected?
How Secure Are Your Machine Identities? Where technology drives growth and innovation, are we adequately securing the machine identities that power our digital? Non-human identities (NHIs), encompassing machine identities like APIs, service accounts, and IoT devices, play a pivotal role in modern cybersecurity architectures. Yet, their management often lags behind due to a disconnect between……
-
Face-Swapping Tools Pose Elevated ‘Know Your Customer’ Risks
Easy-to-Use Deepfake Services for Criminals Rapidly Improving, Researchers Warn. Financial firms’ fraud and risk teams must bolster know-your-customer checks in the face of increasingly effective and affordable deepfake technology and services that can generate synthetic identities, convincing face-swaps and defeat live biometric checks to bypass defenses, warn researchers. First seen on govinfosecurity.com Jump to article:…
-
Sprocket Security Appoints Eric Sheridan as Chief Technology Officer
Tags: technologyMadison, United States, 20th January 2026, CyberNewsWire First seen on hackread.com Jump to article: hackread.com/sprocket-security-appoints-eric-sheridan-as-chief-technology-officer/
-
Sprocket Security Appoints Eric Sheridan as Chief Technology Officer
Madison, United States, January 20th, 2026, CyberNewsWire Veteran cybersecurity leader brings decades of experience and patented innovation to advance the next generation of proactive security solutions. Sprocket Securitytoday announced the appointment of Eric Sheridan as Chief Technology Officer (CTO). In this role, Sheridan will lead the company’s technology vision and execution,acceleratinginnovation andadvancingSprocket Security’s mission to…
-
Met claims success for permanent facial recognition in Croydon
Met Police boasts that its permanent deployment of live facial recognition cameras in Croydon has led to more than 100 arrests and prompted a double-digit reduction in local crime, ahead of an upcoming judicial review to assess the technology’s lawfulness First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637351/Met-claims-success-for-permanent-facial-recognition-in-Croydon
-
Fraud Tops Ransomware in WEF’s 2026 Cybersecurity Outlook
Findings From WEF’s 2026 Report Show Shifting Cyber Priorities as AI Reshapes Risk. Cyber-enabled fraud has overtaken ransomware as the top cybersecurity concern for CEOs heading into 2026, according to the World Economic Forum’s Global Cybersecurity Outlook 2026, released ahead of the Davos meeting. AI is a top emerging technology affecting both cyber risk and…
-
Fraud Tops Ransomware in WEF’s 2026 Cybersecurity Outlook
Findings From WEF’s 2026 Report Show Shifting Cyber Priorities as AI Reshapes Risk. Cyber-enabled fraud has overtaken ransomware as the top cybersecurity concern for CEOs heading into 2026, according to the World Economic Forum’s Global Cybersecurity Outlook 2026, released ahead of the Davos meeting. AI is a top emerging technology affecting both cyber risk and…
-
Fraud Tops Ransomware in WEF’s 2026 Cybersecurity Outlook
Findings From WEF’s 2026 Report Show Shifting Cyber Priorities as AI Reshapes Risk. Cyber-enabled fraud has overtaken ransomware as the top cybersecurity concern for CEOs heading into 2026, according to the World Economic Forum’s Global Cybersecurity Outlook 2026, released ahead of the Davos meeting. AI is a top emerging technology affecting both cyber risk and…
-
The LimaCharlie Manifesto: Security for an Autonomous Future
Tags: access, advisory, ai, api, automation, cloud, control, cybersecurity, data, infrastructure, LLM, technology, threat, toolCybersecurity is standing at an inflection point. The proliferation of agentic AI and LLMs does not signal a gradual shift, but a radical transformation. The security tools, assumptions, and architectures of the last twenty years can no longer keep pace with the challenges and threats of today. AI changed the rules. Attackers have quickly adapted. …
-
Thales named Growth Index leader in Frost Radar: Data Security Platforms Report
Tags: access, ai, business, cloud, compliance, container, control, data, defense, detection, edr, encryption, endpoint, governance, identity, intelligence, LLM, monitoring, risk, saas, service, siem, soc, technology, toolThales named Growth Index leader in Frost Radar: Data Security Platforms Report madhav Tue, 01/20/2026 – 04:29 Data has always been the backbone of enterprise operations, but the rise of cloud, big data, and GenAI has multiplied its value and, with it, the motivation for attackers. In parallel, regulatory expectations are increasing and evolving. The…
-
Secure web browsers for the enterprise compared: How to pick the right one
Tags: access, ai, android, api, attack, browser, business, chrome, cloud, computer, control, corporate, data, encryption, endpoint, fortinet, gartner, google, guide, identity, linux, login, malicious, malware, mfa, mobile, monitoring, network, okta, phishing, saas, service, siem, software, technology, threat, tool, training, vpn, windows, zero-trustEnable MFA at the beginning of any browser session by default.Handle isolation controls both with respect to the user’s session and to isolate any application from cross-infection. This means controlling the movement of data between the browser, your particular endpoint and the web application or applications involved.Control access to web destinations, either to allow or…
-
Privacy teams feel the strain as AI, breaches, and budgets collide
Privacy programs are under strain as organizations manage breach risk, new technology, and limited resources. A global study from ISACA shows that AI is gaining ground in … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/20/isaca-privacy-program-pressures/
-
Can AI independently manage secrets without human oversight
How Can Non-Human Identities Enhance Cloud Security? Can organizations truly secure their cloud environments without addressing the role of Non-Human Identities (NHIs)? With technology continues to advance, NHIs have become a crucial component, particularly in managing secrets and enhancing security postures across various sectors. Understanding Non-Human Identities in Cybersecurity At the core of NHIs are……
-
Ransomware attack on Ingram Micro impacts 42,000 individuals
Tags: apple, attack, cisco, cybersecurity, data, data-breach, jobs, microsoft, ransomware, service, supply-chain, technologyIngram Micro says a ransomware attack exposed personal data of about 42,000 people, including names, birth dates, SSNs, and job-related details. Ingram Micro is a global technology distributor and supply-chain services company. It acts as a middleman between IT vendors (like Microsoft, Cisco, HP, Apple, and cybersecurity firms) and businesses, resellers, and service providers, helping…
-
Ingram Micro says ransomware attack affected 42,000 people
Information technology giant Ingram Micro has revealed that a ransomware attack on its systems in July 2025 led to a data breach affecting over 42,000 individuals. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ingram-micro-says-ransomware-attack-affected-42-000-people/
-
The culture you can’t see is running your security operations
Tags: apache, breach, business, compliance, control, credentials, cyber, data, email, exploit, finance, firewall, flaw, identity, intelligence, jobs, network, north-korea, phishing, risk, technology, threat, tool, training, update, vulnerabilityNon-observable culture: The hidden drivers: Now we get interesting.Non-observable culture is everything happening inside people’s heads. Their beliefs about cyber risk. Their attitudes toward security. Their values and priorities when security conflicts with convenience or speed.This is where the real decisions get made.You can’t see someone’s belief that “we’re too small to be targeted” or…
-
From arts degree to cybersecurity: Rona Michele Spiegel brings fresh perspective to cyber leadership
Tags: ai, awareness, business, cisco, ciso, cloud, compliance, computer, cyber, cybersecurity, data, governance, group, hacking, Hardware, intelligence, jobs, network, office, penetration-testing, privacy, psychology, risk, risk-management, skills, software, startup, strategy, supply-chain, technology, tool, vulnerabilityRona Michele Spiegel’s journey to cybersecurity might seem unconventional to some: She studied the arts. But as someone who grew up when computers first appeared and everyone wanted to experiment with them, she did a lot of multimedia work. She was always interested in technology and discussed with art colleagues about where the world was…
-
7 top cybersecurity projects for 2026
Tags: access, ai, api, attack, authentication, business, cisco, ciso, cloud, communications, compliance, control, credentials, cybersecurity, data, defense, detection, email, framework, governance, infrastructure, LLM, mail, phishing, programming, resilience, risk, software, strategy, technology, threat, tool, vulnerability, zero-trust2. Strengthening email security: Phishing continues to be a primary attack vector for stealing credentials and defrauding victims, says Mary Ann Blair, CISO at Carnegie Mellon University. She warns that threat actors are now generating increasingly sophisticated phishing attacks, effectively evading mail providers’ detection capabilities. “Legacy multifactor authentication techniques are now regularly defeated, and threat…
-
7 top cybersecurity projects for 2026
Tags: access, ai, api, attack, authentication, business, cisco, ciso, cloud, communications, compliance, control, credentials, cybersecurity, data, defense, detection, email, framework, governance, infrastructure, LLM, mail, phishing, programming, resilience, risk, software, strategy, technology, threat, tool, vulnerability, zero-trust2. Strengthening email security: Phishing continues to be a primary attack vector for stealing credentials and defrauding victims, says Mary Ann Blair, CISO at Carnegie Mellon University. She warns that threat actors are now generating increasingly sophisticated phishing attacks, effectively evading mail providers’ detection capabilities. “Legacy multifactor authentication techniques are now regularly defeated, and threat…

