Acquisitions

Zscaler acquires Avalor for $350 million

Zscaler, a prominent player in cloud security, has made headlines with its recent acquisition of Israeli startup Avalor for a hefty $350 million. This...

Crowdstrike to acquire Flow Security

CrowdStrike, an American cybersecurity technology company, has officially announced its acquisition of the Israel-based startup 'Flow Security' for $200 million. Flow Security is known...

Cohesity to acquire data security firm Veritas

Cohesity, a leading provider of security software, has made a significant public announcement regarding its intention to acquire data security firm Veritas, a move...

Awards

2024 Cybersecurity Excellence Awards – Extended Deadline

Great news: By popular demand, we extended the deadline for the 2024 CYBERSECURITY EXCELLENCE AWARDS until April 27,2024. In the complex and dynamic world of cybersecurity,...

Sophos Mobile Security wins AV-Test Best Android Security Award

Sophos Mobile Security has won Best Android Security Award from AV-Test for the second consecutive time. To put this into clear perspective, the said...

And the 2021 Cybersecurity Excellence Awards Go To …

Cybersecurity Insiders and the Information Security Community on LinkedIn today announced the winners of the 2021 Cybersecurity Excellence Awards. The 2021 Cybersecurity Excellence Awards honor...

Startups

South Korea Startup to share Cyber Threat Intelligence with Interpol

France based International Criminal Police Organization (INTERPOL) has announced that a South Korean Start-up S2W Lab has signed an agreement with it to share...

Actor Ashton Kutcher Firm backs SentinelOne $70 million Cyber Security Funding

SentinelOne, a cyber security startup which offers products & services having the capability to detect suspicious behavior on devices operating in corporate environments has...

Empowering the User: An Interview with Guy Guzner on SAVVY’s User-Centric Security Solution

The Human Factor in Cybersecurity In cybersecurity, the user is often considered the weakest link in the security chain. This weakness stems from the myriad...
- Advertisement -

Most Popular in Business

Random Business

Latest reviews

Top 6 API Security Best Practices for 2022

Thinking about all the high-profile cyber threats that businesses face today can make you feel overwhelmed. The most devastating security breach incidents that made...

FBI still unsure about Israel Phantom Spyware

After spending a time span of two full years on thinking, US’s Federal Bureau of Investigation (FBI) is still unsure on whether to buy...

AI implants in Brain could be vulnerable to hackers

As Tesla Chief Elon Musk has invested a lot in startup project Neuralink that links human brains to computer machines using tiny implants, security...

More News