Industry News
Sekoia.io raises €35 million to strengthen its positioning on the international stage
Sekoia.io raised €35 million in a new round of financing from Banque des Territoires, European investor Bright Pixel (former Sonae IM) and its historical investors Omnes …
NETSCOUT launches visibility and instrumentation for threat detection in 4G and 5G networks
NETSCOUT has introduced Arbor Sightline Mobile and MobileStream to answer mobile network operators’ (MNO) need for scalable, real-time visibility, detection, and mitigation of …
Delinea Cloud Suite updates reduce the risk of lateral movement in cybersecurity breaches
Delinea announced the latest version of Cloud Suite, part of its Server PAM solution, which provides privileged access to and authorization for servers. Delinea Cloud Suite …
Hornetsecurity 365 Permission Manager helps companies protect critical data
Hornetsecurity launched 365 Permission Manager – a user-friendly, admin-centred solution to manage permissions, enforce compliance policies, and monitor violations within …
Red Hat Advanced Cluster Security Cloud Service scales cloud-native security across the hybrid cloud
Red Hat Advanced Cluster Security Cloud Service brings together Kubernetes-native security capabilities with the convenience and support of a fully Red Hat-managed offering. …
Radware Cloud Web DDoS Protection blocks Tsunami DDoS attacks
Radware has introduced a new Cloud Web DDoS Protection solution to minimize the growing gap between standard DDoS mitigation and an emerging generation of more aggressive, …
Vaultree unveils Fully Functional Data-In-Use Encryption solution for the healthcare sector
Vaultree announces a major leap forward in healthcare data protection, bringing its Fully Functional Data-In-Use Encryption solution to the sector. Coupled with a …
Veriff Age Estimation prevents users from accessing age restricted products or services
Veriff announced its new Age Estimation solution, built to further streamline the age verification process for customers. Veriff Age Estimation uses facial biometrics to …
Stytch expands its platform to offer B2B authentication
Stytch’s new offering enables B2B products and applications to build and deliver the enterprise-grade authentication requirements that their customers require, while …
Red Hat Trusted Software Supply Chain enhances an organization’s resilience to vulnerabilities
Red Hat announced Red Hat Trusted Software Supply Chain, a comprehensive solution that enhances resilience to software supply chain vulnerabilities. As part of this solution, …
Fusion Risk Management TPRM enhancements deliver continuous monitoring of third parties
Fusion Risk Management announced expanded functionality of its third-party risk management (TPRM) offering. The enhanced solution delivers continuous monitoring of third …
IRONSCALES and Infinigate collaborate to provide customers with email security solution
IRONSCALES has partnered with the Infinigate Group to distribute IRONSCALES’ cloud email security platform in the Benelux, the Nordics, and Switzerland regions, with a view to …
Featured news
Sponsored
Don't miss
- Black Friday shoppers targeted with thousands of fraudulent online stores
- RomCom hackers chained Firefox and Windows zero-days to deliver backdoor
- How to recognize employment fraud before it becomes a security issue
- Practical strategies to build an inclusive culture in cybersecurity
- Domain security posture of Forbes Global 2000 companies