A total of nine cybersecurity-related acquisitions were announced in the first 10 days of October 2021. 11:11 Systems acquires Green Cloud Defense Managed infrastructure solutions provider 11:11 Systems acquired Green Cloud Defense, a cloud infrastructure-as-a-service provider that specializes in managed cloud security solutions. The deal will help 11:11 Systems expand its capabilities and grow its…

Featuring support for the FIDO2/WebAuthn and U2F protocols, YubiKey Bio Series leverages fingerprint recognition to enable users to securely log in to their accounts using a second factor or without passwords at all. The new security keys support the biometric enrollment and management features that have been implemented in modern platforms and operating systems. According…

The pilot program financially rewards developers who help improve the security of critical open source projects and is meant to complement existing vulnerability management programs. Committed to boost the security of the open source ecosystem, the Internet search giant recently pledged $100 million in support for projects that aim to fix vulnerabilities in open source…

Robotic Process Automation (RPA) is one of the key technologies fueling digital transformation. Ranked by industry experts as one of the fastest-growing enterprise software categories, RPA is helping businesses and their employees achieve the efficiency, accuracy and speed needed to compete and thrive. By approaching RPA automation projects and cybersecurity hand in hand, organizations can…

The Federal Trade Commission (FTC) commissioners, in a split-vote (3-2), issued a policy statement on September 15, requiring both health applications and connected devices to comply with the “Health Breach Notification Rule (August 2009).” The commissioners recognized how the applications and devices did not fall within the scope of the Health Insurance Portability and Accountability…

Saviynt plans to invest the funds in research and development and personnel, to better meet demand for its cloud-based identity solution. Increasingly aware of risks associated with identity-related security breaches, organizations worldwide are shifting toward a Zero Trust approach in which identity management is a central piece. Alongside identity governance (IGA), the company’s Enterprise Identity…

Starting last year, the video calling platform has been offering E2EE in Zoom Meetings, and it is now ready to make it available for one-on-one phone conversations made through the Zoom client as well. Once the new feature is available, users will see a “More” option during phone calls, allowing them to turn on encryption,…

ProtonMail, a privacy and security-focused email provider based in Switzerland, has been strongly criticized for providing the IP address of a customer to Swiss authorities, ultimately leading to the arrest of a climate activist in France. But simply blaming ProtonMail misses the important lessons of this case. Background French authorities were aware that a group…

The company plans to use the new funds to expand its portfolio to support data privacy and compliance risks – with a focus on regulations such as GDPR, CCPA, and the Children’s Online Privacy Protection Act (COPPA) –, and to expand its global presence. Pixalate LogoFounded in 2012 and headquartered in Santa Monica, California, Pixalate…

The more things change, the more they stay the same. Despite a changing threat landscape and threat actors who keep upping their game, the vulnerabilities behind the threats remain consistent. The OWASP Top 10, ranked by the Open Web Application Security Project, lists the 10 most prominent and dangerous risks and threats for applications. The OWASP…