Axonius cybersecurity asset management app now available on Cortex by Palo Alto Networks
Axonius announced the availability of its cybersecurity asset management app on Cortex by Palo Alto Networks – the industry’s only open and integrated AI-based continuous …

Axonius named most innovative startup at RSA Conference 2019
RSA Conference announced that Axonius was selected winner of the fourteenth-annual RSAC Innovation Sandbox Contest. Duality Technologies was recognized as well by the judges …

5 reasons why asset management is a hot topic
Sometimes buzzwords are good predictors of what organizations see as priorities in a given year. If you surveyed both the revenue-generating and security functions of …

RSA Conference announces finalists for Innovation Sandbox Contest 2019
RSA Conference announced the 10 finalists for its annual RSAC Innovation Sandbox Contest. The competition is dedicated to providing innovative startups a platform to showcase …

Axonius goes retro to see and secure all devices
Just 6 months after its seed funding, Axonius today announced the general availability of its Cybersecurity Asset Management Platform to enable customers to see and secure all …

Axonius announces $4M seed round to secure the explosion of connected devices
Israeli startup Axonius today announced $4 million in seed funding for its mission to secure and manage the growing billions of connected devices in use by businesses. Backing …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility