
Forensic Access acquires IntaForensics strengthens their position as a leading forensic services organisation
Forensic Access has acquired digital forensics specialists IntaForensics to consolidate their position, backed by Limerston Capital. Oxfordshire-based Forensic Access’ portfolio of expertise covers the spectrum of forensic services from Biology Chemistry and Medicine…

Culture Shift of IT Security in Agile World
Agile software development is becoming more prevalent in the digital evolution of today’s world. Culture shift in Agile is meant to help organizations to be more efficient and effective in…

LogRhythm tools tailor to the Kingdom of Saudi Arabia’s Essential Cybersecurity Controls (ECC)
LogRhythm has launched reporting capabilities and compliance use cases that make it simple and efficient to comply with the Kingdom of Saudi Arabia’s (KSA) Essential Cybersecurity Controls (ECC). It enables…

Sophos named Common Vulnerability and Exposure Numbering Authority
Sophos has been named a Common Vulnerabilities and Exposures (CVE) Numbering Authority (CNA) in the CVE program, a recognised international standard for identifying and naming cybersecurity vulnerabilities. With this status,…

Splunk to Acquire Network Performance Monitoring Leader Flowmill
Acquisition to Extend the Power of Splunk’s Industry-Leading Observability Platform Splunk Inc. has signed a definitive agreement to acquire Flowmill, a Palo-Alto based cloud network observability company with expertise in network performance monitoring (NPM). The acquisition is expected to close…

Connected Medical Device Security – Forescout report
Increasingly, hospitals, GPs, aged care providers and other healthcare delivery organisations (HDOs) have complex network infrastructure with a growing volume of operational technology (OT), Internet of Things (IoT) and Internet of Medical Things (IoMT) devices alongside traditional IT, which is…

Race for quantum supremacy gathers momentum with several companies joining bandwagon
Quantum computers are a step closer to reality to solve certain real life problems that are beyond the capability of conventional computers. However, the biggest challenge is that these machines should be able to manipulate several dozens of quantum bits…