Industry News

Centrify ushers in new era of privileged access management
Centrify, a leading provider of cloud-ready Zero Trust Privilege to secure modern enterprises, announced new cloud-ready solutions to help stop the leading cause of data …

Secureworks announces Orchestration and Automation solution
Secureworks, a leading global cybersecurity company, announced the launch of its Orchestration and Automation solution to help organizations reduce their cybersecurity …

Basil Security unveils security policy enforcement solution
Basil Security, the Zero Trust Operations company, announced general availability of the world’s first policy-as-code platform that provides stateful security policy …

Tripwire expands coverage and support for DevOps environments
Tripwire, a leading global provider of security and compliance solutions for enterprises and industrial organizations, announced at RSA Conference expanded coverage and …

Capsule8 expands leadership team with key executive hires
Capsule8, the only company providing high-performance attack protection for Linux production environments, announced additions to its executive team, appointing Jim Bandanza …

CSA launches compliance assessment program for cloud service providers
The Cloud Security Alliance (CSA) announced STAR Continuous Self Assessment, the first release of an evolving continuous-compliance assessment program for cloud services that …
Comcast acquires BluVector, developer of AI-powered cybersecurity technology
Comcast announced it has acquired BluVector, a company that uses advanced artificial intelligence and machine learning to provide cybersecurity protection to companies and …

Gemalto expands cloud-based Hardware Security Module solutions
Gemalto, the world leader in digital security, announced the availability of three new cloud-based Hardware Security Module (HSM) services, HSM On Demand for CyberArk, HSM On …

NTT Security Corporation acquires WhiteHat Security
NTT Security has signed a definitive agreement to acquire privately-owned WhiteHat Security, the leading application security provider committed to securing applications that …

RSA helps customers address digital transformation risks
RSA announced at the RSA Conference new enhancements to its award-winning Integrated Risk Management platform, RSA Archer, to help customers fundamentally transform their risk …

Armor Scientific makes authentication as easy as walking into a room
Armor Scientific, a cybersecurity company purpose built to manage the identity of everything, announced the company is emerging from stealth mode at the RSA Conference. …

Sysdig enhances its Cloud-Native Intelligence Platform
Sysdig announced new features for its Cloud-Native Intelligence Platform focused on helping enterprises transition to containers, reduce security risks, increase compliance …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence