Please turn on your JavaScript for this page to function normally.
DTEX InTERCEPT delivers advanced UAM and workforce behavioral awareness capabilities

DTEX Systems announced enhancements to DTEX InTERCEPT for critical infrastructure entities – a workforce cybersecurity solution specifically created to address the user …

Sysdig introduces unified cloud and container security with the launch of CSPM

Sysdig announced the addition of unified cloud and container security with the launch of continuous cloud security posture management (CSPM). Threat research conducted by …

Argus collaborates with Microsoft to provide a cloud security solution to vehicle manufacturers

Argus Cyber Security has collaborated with Microsoft Azure IoT and joined the Microsoft partner network to provide vehicle manufacturers the ability to monitor, detect, and …

McAfee
McAfee unveils MVISION CNAPP, a new security service designed to secure cloud native applications

McAfee announced the general availability of McAfee MVISION Cloud Native Application Protection Platform (CNAPP), a new security service designed to secure cloud native …

AttackIQ platform automates the validation of AI and ML-based security technologies

AttackIQ announced a series of technology innovations to the AttackIQ Informed Defense Architecture (AIDA) that allow cybersecurity teams to better test their people, …

MITRE Engenuity to assess commercial cybersecurity products’ ability to detect threats

MITRE Engenuity will assess commercial cybersecurity products’ ability to detect the threat posed by the groups commonly known as Sandworm and Wizard Spider, both of whom have …

Purdue University and MITRE form partnership to advance innovation and workforce development

Purdue University and MITRE are combining their expertise and capabilities to form a new public-private partnership focusing on key areas of national safety and security. …

MITRE ATT&CK
Top 10 most used MITRE ATT&CK tactics and techniques

Which tactics and techniques are cyber attackers favoring? vFeed has compiled a list of the Top 10 Most Used MITRE ATT&CK Tactics and Techniques to help security teams …

MITRE ATT&CK
Three ways MITRE ATT&CK can improve your organizational security

There’s a good reason everyone’s talking about MITRE ATT&CK: it’s an objective, third-party standard with which organizations can measure their own detection coverage, as …

MITRE names Gerald Gilbert a MITRE Fellow

MITRE named Gerald Gilbert, Ph.D., a MITRE Fellow to expand MITRE’s quantum science initiatives. MITRE Fellows are a select group of preeminent scientists in their fields who …

shark
2020 to reach vulnerability disclosure levels similar to those in 2019

The number of vulnerability disclosures is back on track to reach or bypass 2019 as we head into 2021, according to Risk Based Security. The team aggregated 17,129 …

Brain
A new threat matrix outlines attacks against machine learning systems

A report published last year has noted that most attacks against artificial intelligence (AI) systems are focused on manipulating them (e.g., influencing recommendation …

Don't miss

Cybersecurity news