Industry News
A10 Networks vThunder TPS: Providing 100 Gbps throughput in a single virtual appliance
A10 Networks announced it has delivered the industry’s highest-performance virtual DDoS defense solution with its software version of the Thunder Threat Protection System …
CyberArk lauches new program to help customers reduce privilege-related risk
CyberArk, the global leader in privileged access management, announced the CyberArk Blueprint for Privileged Access Management Success. The most comprehensive program of its …
HCC Embedded adds MISRA-compliant TLS 1.3 module to its TCP/IP stack
Building on a history of delivering high-quality embedded software components, HCC Embedded (HCC) has added a fully MISRA-compliant TLS (Transport Layer Security) 1.3 module …

Spirent enhances its data breach assessment solution with network security attack exposure capabilities
Spirent Communications, the trusted provider of test, measurement, assurance, and analytics solutions for next-generation devices and networks, announced a major new release …

Gurucul Risk Analytics platform automates threat detection and response for MITRE ATT&CK Framework
Gurucul, a leader in unified security and risk analytics technology for on-premises and the cloud, announced the Gurucul Risk Analytics (GRA) platform has added and aligned …

Richard Stiennon publishes Security Yearbook 2020, covers the history of the IT security industry
Author, industry analyst, and founder of IT-Harvest, Richard Stiennon, announced the release of “Security Yearbook 2020: A History and Directory of the IT Security Industry.” …
iProov Verifier allows enterprises to authenticate customers via fixed device as well as mobile
iProov, a leading provider of biometric authentication technology, announces that its Verifier product is now available to organisations needing to verify customer identities …
Clumio Enterprise Backup as a Service validated for VMware Cloud on AWS
Clumio, innovators of authentic SaaS for enterprise backup, announced that its Enterprise Backup as a Service solution has attained VMware Partner Ready for VMware Cloud on …
Three ISACA credentials among the IT industry’s top-paying certifications
Three ISACA credentials are among the IT industry’s top-paying certifications, according to recently released data from the Global Knowledge 2020 IT Skills and Salary Survey. …

esCLOUD extends managed detection and response to cloud platforms
eSentire announced the availability of esCLOUD. This comprehensive portfolio extends eSentire’s industry-leading MDR capabilities and elite threat hunting expertise for …

Devo Security Operations: Transforming the SOC and scaling security analyst effectiveness
Devo Technology announced Devo Security Operations, the first security operations solution to combine critical security capabilities together with auto enrichment, threat …
Perimeter 81 unveils new SASE platform combining NaaS with cloud security capabilities
Perimeter 81, a leading Zero Trust network provider for enterprises and organizations, announced a new Secure Access Service Edge (SASE) platform that combines its Network as …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility