{"id":1806481,"date":"2019-04-29T20:19:07","date_gmt":"2019-04-30T00:19:07","guid":{"rendered":"https:\/\/securityboulevard.com\/?page_id=1806481"},"modified":"2019-04-29T20:21:49","modified_gmt":"2019-04-30T00:21:49","slug":"news-releases","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/news-releases\/","title":{"rendered":"Cybersecurity News Releases"},"content":{"rendered":"<div id=\"pl-1806481\"  class=\"panel-layout\" ><div id=\"pg-1806481-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1806481-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1806481-0-0-0\" class=\"so-panel widget_text panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-1806481-0-0-0\" >\t\t\t<div class=\"textwidget\"><p>Latest Cybersecurity News Releases<\/p>\n<\/div>\n\t\t<\/div><\/div><div id=\"panel-1806481-0-0-1\" class=\"widget_text so-panel widget_custom_html panel-last-child\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore\" id=\"pt-cv-view-972ab047qm\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2014326\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/04\/techstrong-group-announces-rebranding-of-security-bloggers-network-to-security-creators-network\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"130\" height=\"90\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Techstrong Group Announces Rebranding of Security Bloggers Network to Security Creators Network\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/04\/https___cdn.evbuc_.com_images_739269039_95485116569_1_original-130x90.jpeg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/04\/techstrong-group-announces-rebranding-of-security-bloggers-network-to-security-creators-network\/\" class=\"_self cvplbd\" target=\"_self\" >Techstrong Group Announces Rebranding of Security Bloggers Network to Security Creators Network<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/veronica\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/5b09e9e14f81406ef2e1f221d6bf1e8d?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/5b09e9e14f81406ef2e1f221d6bf1e8d?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Veronica Haggar<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-04-09T09:30:36-04:00\">April 9, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cyber-marketing-professionals-society\/' title='Cyber Marketing Professionals Society' class='pt-cv-tax-cyber-marketing-professionals-society'>Cyber Marketing Professionals Society<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity-community\/' title='cybersecurity community' class='pt-cv-tax-cybersecurity-community'>cybersecurity community<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/networking-event\/' title='networking event' class='pt-cv-tax-networking-event'>networking event<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security-creators-meetup\/' title='Security Creators Meetup' class='pt-cv-tax-security-creators-meetup'>Security Creators Meetup<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security-creators-network\/' title='Security Creators Network' class='pt-cv-tax-security-creators-network'>Security Creators Network<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security-meetup\/' title='security meetup' class='pt-cv-tax-security-meetup'>security meetup<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">BOCA RATON, FL, April 9, 2024 \u2014 Techstrong Group, the power source for people and technology, is excited to announce the rebranding of the renowned Security Bloggers Network to the Security Creators Network. With over 350 security-focused content creators, the network has been a staple in the cybersecurity community for ... <a href=\"https:\/\/securityboulevard.com\/2024\/04\/techstrong-group-announces-rebranding-of-security-bloggers-network-to-security-creators-network\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2013306\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/03\/gopluss-latest-report-highlights-how-blockchain-communities-are-leveraging-critical-api-security-data-to-mitigate-web3-threats\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"130\" height=\"90\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"GoPlus&#039;s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/03\/photo_2024-03-27_11-50-18_1711634249BAYRGDETen-130x90.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/03\/gopluss-latest-report-highlights-how-blockchain-communities-are-leveraging-critical-api-security-data-to-mitigate-web3-threats\/\" class=\"_self cvplbd\" target=\"_self\" >GoPlus&#8217;s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/cyberwire\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/9b06f557850fe3262f9e463af1a03d01?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9b06f557850fe3262f9e463af1a03d01?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Cyber Newswire<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-03-28T12:29:25-04:00\">March 28, 2024<\/time><\/span><\/div>\n<div class=\"pt-cv-content\">Singapore, Singapore, March 28th, 2024, Cyber Newswire GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report that highlights the growing, widespread use and potential of Web3 user security data to aid in risk management. The findings of the report reveal a clear and growing demand for ... <a href=\"https:\/\/securityboulevard.com\/2024\/03\/gopluss-latest-report-highlights-how-blockchain-communities-are-leveraging-critical-api-security-data-to-mitigate-web3-threats\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2013276\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/03\/c2a-securitys-evsec-risk-management-and-automation-platform-gains-traction-in-automotive-industry-as-companies-seek-to-efficiently-meet-regulatory-requirements\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"130\" height=\"90\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"C2A Security\u2019s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/03\/C2A_Logo_1200X720_1711618406v2pzUbnTXz-130x90.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/03\/c2a-securitys-evsec-risk-management-and-automation-platform-gains-traction-in-automotive-industry-as-companies-seek-to-efficiently-meet-regulatory-requirements\/\" class=\"_self cvplbd\" target=\"_self\" >C2A Security\u2019s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/cyberwire\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/9b06f557850fe3262f9e463af1a03d01?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9b06f557850fe3262f9e463af1a03d01?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Cyber Newswire<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-03-28T09:23:11-04:00\">March 28, 2024<\/time><\/span><\/div>\n<div class=\"pt-cv-content\">Jerusalem, Israel, March 28th, 2024, Cyber Newswire \u00a0In 2023 alone, more than 10 customers and partners signed commercial agreements with C2A Security, including a global, long term enterprise agreement with an European Commercial Vehicle Manufacturer C2A Security\u2019s DevSecOps Platform, \u2018EVSec\u2019, has been gaining widespread traction as the automotive industry rushes ... <a href=\"https:\/\/securityboulevard.com\/2024\/03\/c2a-securitys-evsec-risk-management-and-automation-platform-gains-traction-in-automotive-industry-as-companies-seek-to-efficiently-meet-regulatory-requirements\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2011254\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/03\/zama-raises-73m-in-series-a-lead-by-multicoin-capital-and-protocol-labs-to-commercialize-fully-homomorphic-encryption\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"130\" height=\"90\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/03\/ZAMA-01-24-HD-NL-2_1709734566O5HW72bHHN-130x90.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/03\/zama-raises-73m-in-series-a-lead-by-multicoin-capital-and-protocol-labs-to-commercialize-fully-homomorphic-encryption\/\" class=\"_self cvplbd\" target=\"_self\" >Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/cyberwire\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/9b06f557850fe3262f9e463af1a03d01?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9b06f557850fe3262f9e463af1a03d01?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Cyber Newswire<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-03-07T01:55:17-05:00\">March 7, 2024<\/time><\/span><\/div>\n<div class=\"pt-cv-content\">Paris, France, March 7th, 2024, Cyber Newswire Company Open Sources FHE Libraries to Build Privacy-Preserving Blockchain and AI Applications for the First Time. Investment secured to bring Fully Homomorphic Encryption (FHE) to the fore, giving developers the ability to address data privacy challenges across blockchain and AI use cases. Zama, ... <a href=\"https:\/\/securityboulevard.com\/2024\/03\/zama-raises-73m-in-series-a-lead-by-multicoin-capital-and-protocol-labs-to-commercialize-fully-homomorphic-encryption\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2010371\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/02\/rsm-us-deploys-stellar-cyber-open-xdr-platform-to-secure-clients\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"130\" height=\"90\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/02\/image1_1709116853hGK5gx7b73-130x90.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/02\/rsm-us-deploys-stellar-cyber-open-xdr-platform-to-secure-clients\/\" class=\"_self cvplbd\" target=\"_self\" >RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/cyberwire\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/9b06f557850fe3262f9e463af1a03d01?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9b06f557850fe3262f9e463af1a03d01?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Cyber Newswire<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-02-28T09:00:12-05:00\">February 28, 2024<\/time><\/span><\/div>\n<div class=\"pt-cv-content\">San Jose, CA, February 28th, 2024, Cyber Newswire Platform Delivers Total Visibility and Control Across a Global Client Footprint Stellar Cyber, the innovator of Open XDR, today announced that RSM US \u2013\u00a0the leading provider of professional services to the middle market \u2013 is leveraging the Stellar Cyber Open XDR platform ... <a href=\"https:\/\/securityboulevard.com\/2024\/02\/rsm-us-deploys-stellar-cyber-open-xdr-platform-to-secure-clients\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2010083\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/02\/threathunter-ai-halts-hundreds-of-attacks-in-the-past-48-hours-combating-ransomware-and-nation-state-cyber-threats-head-on\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"130\" height=\"90\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/02\/threathunterAI_logo_1708936503f4gxJbwdli-130x90.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/02\/threathunter-ai-halts-hundreds-of-attacks-in-the-past-48-hours-combating-ransomware-and-nation-state-cyber-threats-head-on\/\" class=\"_self cvplbd\" target=\"_self\" >ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/cyberwire\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/9b06f557850fe3262f9e463af1a03d01?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9b06f557850fe3262f9e463af1a03d01?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Cyber Newswire<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-02-26T05:19:19-05:00\">February 26, 2024<\/time><\/span><\/div>\n<div class=\"pt-cv-content\">Brea, California, February 26th, 2024, Cyber Newswire The current large surge in cyber threats has left many organizations grappling for security so ThreatHunter.ai is taking decisive action. Recognizing the critical juncture at which the digital world stands, ThreatHunter.ai is now offering their cutting-edge cybersecurity services free of charge to all ... <a href=\"https:\/\/securityboulevard.com\/2024\/02\/threathunter-ai-halts-hundreds-of-attacks-in-the-past-48-hours-combating-ransomware-and-nation-state-cyber-threats-head-on\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2007000\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/01\/aembit-announces-new-workload-iam-integration-with-crowdstrike-to-help-enterprises-secure-workload-to-workload-access\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"130\" height=\"90\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Aembit Announces New Workload IAM Integration with CrowdStrike to Help Enterprises Secure Workload-to-Workload Access\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/01\/Aembit_17065663013NJIosmngg-130x90.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/01\/aembit-announces-new-workload-iam-integration-with-crowdstrike-to-help-enterprises-secure-workload-to-workload-access\/\" class=\"_self cvplbd\" target=\"_self\" >Aembit Announces New Workload IAM Integration with CrowdStrike to Help Enterprises Secure Workload-to-Workload Access<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/cyberwire\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/9b06f557850fe3262f9e463af1a03d01?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9b06f557850fe3262f9e463af1a03d01?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Cyber Newswire<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-01-30T10:16:19-05:00\">January 30, 2024<\/time><\/span><\/div>\n<div class=\"pt-cv-content\">Silver Spring, Maryland, January 30th, 2024, Cyber Newswire Aembit Becomes the First Workload IAM Platform to Integrate with the Industry-Leading CrowdStrike Falcon Platform to Drive Workload Conditional Access Aembit, the Workload Identity and Access Management (IAM) platform that enables DevOps and security teams to discover, manage, enforce and audit access ... <a href=\"https:\/\/securityboulevard.com\/2024\/01\/aembit-announces-new-workload-iam-integration-with-crowdstrike-to-help-enterprises-secure-workload-to-workload-access\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2006931\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/01\/control-d-launches-control-d-for-organizations-democratizing-cybersecurity-for-organizations-of-all-sizes\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"130\" height=\"90\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Control D Launches Control D for Organizations: Democratizing Cybersecurity for Organizations of All Sizes\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/01\/Secure_End_User_Devices_1706281596tLM4NNi78i-130x90.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/01\/control-d-launches-control-d-for-organizations-democratizing-cybersecurity-for-organizations-of-all-sizes\/\" class=\"_self cvplbd\" target=\"_self\" >Control D Launches Control D for Organizations: Democratizing Cybersecurity for Organizations of All Sizes<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/cyberwire\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/9b06f557850fe3262f9e463af1a03d01?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9b06f557850fe3262f9e463af1a03d01?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Cyber Newswire<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-01-29T16:17:57-05:00\">January 29, 2024<\/time><\/span><\/div>\n<div class=\"pt-cv-content\">Toronto, Canada, January 29th, 2024, Cyber Newswire In an era where online threats no longer discriminate by business size, Control D, powered by Windscribe VPN&#8216;s robust security expertise, announced today the launch of &#8216;Control D for Organizations&#8216;. This modern DNS service democratizes cybersecurity, making it accessible to businesses of every ... <a href=\"https:\/\/securityboulevard.com\/2024\/01\/control-d-launches-control-d-for-organizations-democratizing-cybersecurity-for-organizations-of-all-sizes\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2006118\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/01\/deloitte-partners-with-memcyco-to-combat-ato-and-other-online-attacks-with-real-time-digital-impersonation-protection-solutions\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"130\" height=\"90\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/01\/Memcyco1_17059241762IsuS3s9Xs-130x90.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/01\/deloitte-partners-with-memcyco-to-combat-ato-and-other-online-attacks-with-real-time-digital-impersonation-protection-solutions\/\" class=\"_self cvplbd\" target=\"_self\" >Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/cyberwire\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/9b06f557850fe3262f9e463af1a03d01?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9b06f557850fe3262f9e463af1a03d01?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Cyber Newswire<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-01-22T12:55:19-05:00\">January 22, 2024<\/time><\/span><\/div>\n<div class=\"pt-cv-content\">New York, U.S.A., January 22nd, 2024, Cyber Newswire Memcyco will showcase its solutions at Deloitte\u2019s annual Cyber iCON event, demonstrating how organizations can build effective defenses to protect their customers against digital impersonation fraud Memcyco Inc, the real-time digital impersonation detection and prevention solution provider, and Deloitte, the leading consulting, ... <a href=\"https:\/\/securityboulevard.com\/2024\/01\/deloitte-partners-with-memcyco-to-combat-ato-and-other-online-attacks-with-real-time-digital-impersonation-protection-solutions\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"1979123\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2023\/06\/techstrong-group-team-expands-with-cybersecurity-and-devops-industry-experts\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2023\/06\/techstrong-group-team-expands-with-cybersecurity-and-devops-industry-experts\/\" class=\"_self cvplbd\" target=\"_self\" >Techstrong Adds Two Industry Luminaries<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/veronica\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/5b09e9e14f81406ef2e1f221d6bf1e8d?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/5b09e9e14f81406ef2e1f221d6bf1e8d?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Veronica Haggar<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2023-06-21T10:00:51-04:00\">June 21, 2023<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/industry-leaders\/' title='industry leaders' class='pt-cv-tax-industry-leaders'>industry leaders<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/john-willis\/' title='John Willis' class='pt-cv-tax-john-willis'>John Willis<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/leadership\/' title='Leadership' class='pt-cv-tax-leadership'>Leadership<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/shira-rubinoff\/' title='Shira Rubinoff' class='pt-cv-tax-shira-rubinoff'>Shira Rubinoff<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/techstrong-group\/' title='Techstrong Group' class='pt-cv-tax-techstrong-group'>Techstrong Group<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">DevOps pioneer and author John Willis and cybersecurity leader Shira Rubinoff join the team at Techstrong Group Boca Raton, FL, June 21, 2023 \u2014 Techstrong, the power source for people and technology, that empowers people and technology, today announced the addition of two industry luminaries to its team.\u00a0 Shira Rubinoff, ... <a href=\"https:\/\/securityboulevard.com\/2023\/06\/techstrong-group-team-expands-with-cybersecurity-and-devops-industry-experts\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><a href='https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1806481\/?_page=2' onclick='event.preventDefault()' class=\"pt-cv-more btn btn-primary btn-sm\" data-totalpages=\"39\" data-nextpages=\"2\" data-sid=\"972ab047qm\" data-unid=\"\" data-isblock=\"\" data-postid=\"\">Load more <span class=\"caret\"><\/span><\/a><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,R0lGODlhDwAPALMPAMrKygwMDJOTkz09PZWVla+vr3p6euTk5M7OzuXl5TMzMwAAAJmZmWZmZszMzP\/\/\/yH\/C05FVFNDQVBFMi4wAwEAAAAh+QQFCgAPACwAAAAADwAPAAAEQvDJaZaZOIcV8iQK8VRX4iTYoAwZ4iCYoAjZ4RxejhVNoT+mRGP4cyF4Pp0N98sBGIBMEMOotl6YZ3S61Bmbkm4mAgAh+QQFCgAPACwAAAAADQANAAAENPDJSRSZeA418itN8QiK8BiLITVsFiyBBIoYqnoewAD4xPw9iY4XLGYSjkQR4UAUD45DLwIAIfkEBQoADwAsAAAAAA8ACQAABC\/wyVlamTi3nSdgwFNdhEJgTJoNyoB9ISYoQmdjiZPcj7EYCAeCF1gEDo4Dz2eIAAAh+QQFCgAPACwCAAAADQANAAAEM\/DJBxiYeLKdX3IJZT1FU0iIg2RNKx3OkZVnZ98ToRD4MyiDnkAh6BkNC0MvsAj0kMpHBAAh+QQFCgAPACwGAAAACQAPAAAEMDC59KpFDll73HkAA2wVY5KgiK5b0RRoI6MuzG6EQqCDMlSGheEhUAgqgUUAFRySIgAh+QQFCgAPACwCAAIADQANAAAEM\/DJKZNLND\/kkKaHc3xk+QAMYDKsiaqmZCxGVjSFFCxB1vwy2oOgIDxuucxAMTAJFAJNBAAh+QQFCgAPACwAAAYADwAJAAAEMNAs86q1yaWwwv2Ig0jUZx3OYa4XoRAfwADXoAwfo1+CIjyFRuEho60aSNYlOPxEAAAh+QQFCgAPACwAAAIADQANAAAENPA9s4y8+IUVcqaWJ4qEQozSoAzoIyhCK2NFU2SJk0hNnyEOhKR2AzAAj4Pj4GE4W0bkJQIAOw==\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-3fcc67eu60\">#pt-cv-view-972ab047qm .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-972ab047qm  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-972ab047qm .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-972ab047qm .pt-cv-title a, #pt-cv-view-972ab047qm  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-972ab047qm  .pt-cv-title a:hover, #pt-cv-view-972ab047qm  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-972ab047qm .pt-cv-content , #pt-cv-view-972ab047qm  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-972ab047qm .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-972ab047qm .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-972ab047qm .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-972ab047qm .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; }\n#pt-cv-view-972ab047qm .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-972ab047qm  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-972ab047qm  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='972ab047qm'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-972ab047qm  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-972ab047qm  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='972ab047qm'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Latest Cybersecurity News Releases<\/p>\n","protected":false},"author":6042,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1806481","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity News Releases - Security Boulevard<\/title>\n<meta name=\"description\" content=\"Cybersecurity News including Analytics, CISO, Cloud Security, Cybercrime, Data Security, DevOps, GRC, IoT, Social Engineering, Threats &amp; Breaches and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/news-releases\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity News Releases\" \/>\n<meta property=\"og:description\" content=\"Latest Cybersecurity News Releases\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/news-releases\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2019-04-30T00:21:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1524\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/news-releases\/\",\"url\":\"https:\/\/securityboulevard.com\/news-releases\/\",\"name\":\"Cybersecurity News Releases - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"datePublished\":\"2019-04-30T00:19:07+00:00\",\"dateModified\":\"2019-04-30T00:21:49+00:00\",\"description\":\"Cybersecurity News including Analytics, CISO, Cloud Security, Cybercrime, Data Security, DevOps, GRC, IoT, Social Engineering, Threats & Breaches and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/news-releases\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/news-releases\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/news-releases\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity News Releases\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity News Releases - Security Boulevard","description":"Cybersecurity News including Analytics, CISO, Cloud Security, Cybercrime, Data Security, DevOps, GRC, IoT, Social Engineering, Threats & Breaches and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/news-releases\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity News Releases","og_description":"Latest Cybersecurity News Releases","og_url":"https:\/\/securityboulevard.com\/news-releases\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2019-04-30T00:21:49+00:00","og_image":[{"width":1524,"height":512,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/news-releases\/","url":"https:\/\/securityboulevard.com\/news-releases\/","name":"Cybersecurity News Releases - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"datePublished":"2019-04-30T00:19:07+00:00","dateModified":"2019-04-30T00:21:49+00:00","description":"Cybersecurity News including Analytics, CISO, Cloud Security, Cybercrime, Data Security, DevOps, GRC, IoT, Social Engineering, Threats & Breaches and more.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/news-releases\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/news-releases\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/news-releases\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity News Releases"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-7zWN","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1806481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1806481"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1806481\/revisions"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1806481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}