Jon Gold

Senior Writer

Jon Gold covers IoT and wireless networking for Network World. He can be reached at jon_gold@idg.com.

Identity management difficulties continue to plague IT departments

Identity management difficulties continue to plague IT departments

Centralizing and managing identity data remains a low priority for many IT decision-makers, according to a new study.

New Deep Instinct partner program targets MSSPs fighting ransomware

New Deep Instinct partner program targets MSSPs fighting ransomware

Deep Instinct's Stratosphere program is indirectly aimed at small and medium-size businesses, which are increasingly turning toward MSSPs (managed security service providers).

Google updates Chronicle with enhanced threat detection

Google updates Chronicle with enhanced threat detection

Google Cloud’s Chronicle will now offer curated threat detection as part of its analytics initiative in the Chronicle SecOps suite.

Safe Security debuts two free risk assessment tools for businesses

Safe Security debuts two free risk assessment tools for businesses

Organizations can gauge their cybersecurity risk factors by using Safe Security’s new online calculators.

Sensitive data in the cloud gets new automated remediation tool from BigID

Sensitive data in the cloud gets new automated remediation tool from BigID

An automated watchdog designed to keep private files in cloud storage secure is now available for Google Drive users, from data intelligence and management company BigID.

Palo Alto debuts Unit 42 team for managed detection and response

Palo Alto debuts Unit 42 team for managed detection and response

Live expert service builds on Palo Alto’s Cortex extended detection and response (XDR) platform provide, offering a managed detection and response (MDR) team for more personalized cybersecurity management and incident response.

Thoma Bravo snares Ping Identity in $2.8 billion go-private deal

Thoma Bravo snares Ping Identity in $2.8 billion go-private deal

Private equity firm Thoma Bravo announced plans to purchase IAM (identity and access management) provider Ping Identity, its latest in a lengthy line of security-focused mergers and acquisitions.

New Facebook malware targets business accounts

New Facebook malware targets business accounts

A Finnish cybersecurity firm has sounded the alarm about a new type of Facebook malware that attempts to compromise business accounts for financial gain.

Kyndryl launches recovery retainer service for cyberattack response

Kyndryl launches recovery retainer service for cyberattack response

Expert preparedness review and on-demand recovery assistance are featured in Kyndryl’s latest offering.

Ransomware attacks slowing as 2022 wears on

Ransomware attacks slowing as 2022 wears on

A welcome slowdown in the pace of ransomware attacks took place in the second quarter of 2022, as Lockbit rose in prominence and Conti faded.

Sophos unifies threat analysis and response units into X-Ops team

Sophos unifies threat analysis and response units into X-Ops team

Cybersecurity vendor Sophos reorganized three prominent organizational teams into a single new entity, for more efficient responses to modern threats.

Recorded Future closes acquisition of malware analysis firm Hatching

Recorded Future closes acquisition of malware analysis firm Hatching

The deal adds malware analysis to Recorded Future’s existing lineup of threat information services.

Google Cloud previews advanced new API security features

Google Cloud previews advanced new API security features

Google’s latest security update for Google Cloud is aimed at curbing API-based attacks.

Google Cloud gets new built-in security features

Google Cloud gets new built-in security features

MITRE ATT&CK integration and baked-in DDoS prevention are now available in Google Cloud.

Kaseya closes $6.2 billion Datto deal, vows to cut prices

Kaseya closes $6.2 billion Datto deal, vows to cut prices

The IT services software provider promises lower costs for consumers, tight integration between the two companies’ products.

Nebulon bakes bare-metal Linux ransomware protection into the bootloader

Nebulon bakes bare-metal Linux ransomware protection into the bootloader

The newest releases of Nebulon’s ImmutableBoot and TimeJump backup systems boast 'reboot-to-recover' functionality for Linux systems.

GitHub open sources Entitlements IAM sytem, built as a Git repository

GitHub open sources Entitlements IAM sytem, built as a Git repository

The company behind one of the most important open source projects in the world is providing a new way to use its framework for IAM (identity and access management) this week.

Microsoft security vulnerabilities drop after five-year rise

Microsoft security vulnerabilities drop after five-year rise

While elevated privilege attacks remain a critical security concern when using Microsoft products, a new report says that the raw number of vulnerabilities is dropping.

Exium expands SASE, 5G-based security for midsize enterprise networks

Exium expands SASE, 5G-based security for midsize enterprise networks

The on-premises module offers new capabilities, based on 5G standards, for midsize businesses.

Canada bans Huawei, ZTE in 5G networks

Canada bans Huawei, ZTE in 5G networks

Ottawa government’s move follows similar bans in other English-speaking countries, citing potential security risks to 5G communications networks.

Load More