Sign up to receive the latest news and special offers
July 11, 2025 | ITBriefcase.net Why it matters: This week brought Microsoft's largest Patch Tuesday of 2025 with 137 vulnerabilities, critical flaws threatening enterprise infrastructure, and major data breaches exposing millions of records. The discovery of wormable...
By Simon Townsend, Head of the Office of the CTO, ControlUp You don’t have to tell an IT administrator that the global application software market is a juggernaut with no signs of stopping. One report estimates the market will more than double from $385.62 billion in...
Why it matters:Â Enterprise security teams are drowning in fragmented tools that create dangerous blind spots, while sophisticated attacks exploit the gaps between disconnected security solutions. What you'll learn:Â How Cybersecurity Mesh Architecture (CSMA) unifies...
Why it matters:Â Security teams are drowning in disparate asset data from hundreds of tools, making it impossible to see what they actually have and where the real risks lie. In this article:Â How Axonius's 1200+ integrations transform scattered data into actionable...
Founder and Executive Chairman Jon Murchison to focus on product innovation, customer engagement, and industry leadership as Gagan Singh accelerates global growth and innovation. JUNE 23, 2025 —DENVER, CO – Blackpoint Cyber, the world’s fastest and most effective...
Why it matters:Â As "citizen developers" across enterprises build AI agents without security training, organizations face new vulnerabilities that traditional tools can't address. We talked with Zenity about their end-to-end platform that secures AI agents from build...
Why it matters:Â GRC officers often have finance or non-technical backgrounds, creating dangerous blind spots in enterprise risk management. AuditBoard's unified platform addresses this gap by integrating cyber risk with traditional GRC functions in one comprehensive...
June 11, 2025 | ITBriefcase.net Why it matters:Â This week brought a perfect storm of cybersecurity challenges that demand immediate IT attention. Critical vulnerabilities in widely-used enterprise software, supply chain attacks affecting nearly a million downloads,...
Major Supply Chain Attack Compromises Popular NPM Packages: Over 1 Million Weekly Downloads Affected
A sophisticated supply chain attack has targeted 17 popular Gluestack NPM packages, potentially exposing millions of developers and applications to malicious code. The cybersecurity community is grappling with yet another significant supply chain attack, this time...
As organizations increasingly rely on Software-as-a-Service (SaaS) applications for their daily operations, traditional security tools struggle to keep pace with these vectors of vulnerabilities. While endpoint detection and identity management solutions handle their...