top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Tigera Supercharges Kubernetes Observability and Security with Calico OSS 3.30
From flow logs to staged policies, the open-source networking leader sharpens its edge with enterprise-grade tools for all. In a major...
Apr 2


JFrog’s 2025 State of the Software Supply Chain: AI, CVEs, and a Rising Storm of Silent Threats
The DevSecOps reality check: manual governance, inflated vulnerabilities, and an evolving AI threatscape converge in this year’s most...
Apr 2


Exabeam Nova Wants to Be the AI Analyst Security Teams Have Been Waiting For
Autonomous, contextual, and finally useful—Nova signals the shift from AI sidekick to security co-pilot. The AI arms race in...
Apr 1


Sherweb Launches Human Risk Management Tool usecure, Targeting Cybersecurity’s Weakest Link: People
In the ongoing arms race between cybercriminals and defenders, it turns out the weakest link in the chain isn’t a firewall or a zero-day...
Apr 1


The Rise of Lookalike Domains: How Subtle Spoofs Are Supercharging Cybercrime
It starts with a single character. Maybe a zero instead of an “o.” An extra letter, a slightly different top-level domain. And just like...
Apr 1


Arkansas School District Targeted by Rhysida Ransomware Gang Demanding $420K
According to an analysis from Comparitech, a ransomware gang known for high-stakes extortion and data leaks has claimed responsibility...
Apr 1
bottom of page