Jon Gold

Senior Writer

Jon Gold covers IoT and wireless networking for Network World. He can be reached at jon_gold@idg.com.

Sensitive data in the cloud gets new automated remediation tool from BigID

Palo Alto debuts Unit 42 team for managed detection and response

Palo Alto debuts Unit 42 team for managed detection and response

Live expert service builds on Palo Alto’s Cortex extended detection and response (XDR) platform provide, offering a managed detection and response (MDR) team for more personalized cybersecurity management and incident response.

Thoma Bravo snares Ping Identity in $2.8 billion go-private deal

Thoma Bravo snares Ping Identity in $2.8 billion go-private deal

Private equity firm Thoma Bravo announced plans to purchase IAM (identity and access management) provider Ping Identity, its latest in a lengthy line of security-focused mergers and acquisitions.

New Facebook malware targets business accounts

New Facebook malware targets business accounts

A Finnish cybersecurity firm has sounded the alarm about a new type of Facebook malware that attempts to compromise business accounts for financial gain.

Kyndryl launches recovery retainer service for cyberattack response

Kyndryl launches recovery retainer service for cyberattack response

Expert preparedness review and on-demand recovery assistance are featured in Kyndryl’s latest offering.

Ransomware attacks slowing as 2022 wears on

Ransomware attacks slowing as 2022 wears on

A welcome slowdown in the pace of ransomware attacks took place in the second quarter of 2022, as Lockbit rose in prominence and Conti faded.

Sophos unifies threat analysis and response units into X-Ops team

Sophos unifies threat analysis and response units into X-Ops team

Cybersecurity vendor Sophos reorganized three prominent organizational teams into a single new entity, for more efficient responses to modern threats.

Recorded Future closes acquisition of malware analysis firm Hatching

Recorded Future closes acquisition of malware analysis firm Hatching

The deal adds malware analysis to Recorded Future’s existing lineup of threat information services.

Google Cloud previews advanced new API security features

Google Cloud previews advanced new API security features

Google’s latest security update for Google Cloud is aimed at curbing API-based attacks.

Google Cloud gets new built-in security features

Google Cloud gets new built-in security features

MITRE ATT&CK integration and baked-in DDoS prevention are now available in Google Cloud.

Kaseya closes $6.2 billion Datto deal, vows to cut prices

Kaseya closes $6.2 billion Datto deal, vows to cut prices

The IT services software provider promises lower costs for consumers, tight integration between the two companies’ products.

Nebulon bakes bare-metal Linux ransomware protection into the bootloader

Nebulon bakes bare-metal Linux ransomware protection into the bootloader

The newest releases of Nebulon’s ImmutableBoot and TimeJump backup systems boast 'reboot-to-recover' functionality for Linux systems.

GitHub open sources Entitlements IAM sytem, built as a Git repository

GitHub open sources Entitlements IAM sytem, built as a Git repository

The company behind one of the most important open source projects in the world is providing a new way to use its framework for IAM (identity and access management) this week.

Microsoft security vulnerabilities drop after five-year rise

Microsoft security vulnerabilities drop after five-year rise

While elevated privilege attacks remain a critical security concern when using Microsoft products, a new report says that the raw number of vulnerabilities is dropping.

Exium expands SASE, 5G-based security for midsize enterprise networks

Exium expands SASE, 5G-based security for midsize enterprise networks

The on-premises module offers new capabilities, based on 5G standards, for midsize businesses.

Canada bans Huawei, ZTE in 5G networks

Canada bans Huawei, ZTE in 5G networks

Ottawa government’s move follows similar bans in other English-speaking countries, citing potential security risks to 5G communications networks.

Red Hat debuts edge features for Linux, Kubernetes platform security

Red Hat debuts edge features for Linux, Kubernetes platform security

At its annual Summit event, Red Hat is rolling out new edge-computing features for the company’s well-known enterprise Linux distribution, and security features for its Advanced Cluster Security for Kubernetes platform.

Russian cyberattacks against Ukraine, other targets expected to rise

Russian cyberattacks against Ukraine, other targets expected to rise

Russia-backed hacking groups have wrought havoc in Ukrainian governmental and industrial systems and show signs of escalating cyberattacks on other targets including those outside of war zone, Microsoft reports.

GitHub repositories compromised by stolen OAuth tokens

GitHub repositories compromised by stolen OAuth tokens

GitHub, Salesforce warn of data theft from private code repositories.

Karakurt data thieves linked to larger Conti hacking group

Karakurt data thieves linked to larger Conti hacking group

Data theft group has apparent ties to another, more prolific hacking crew, according to cybersecurity firm Tetra Defense.

Load More