
Infosec products of the month: November 2024
Here’s a look at the most interesting products from the past month, featuring releases from: Absolute, Arkose Labs, Atakama, BlackFog, Eurotech, HiddenLayer, Hornetsecurity, …

New infosec products of the week: November 15, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Absolute Security, BlackFog, Eurotech, Nirmata, Rakuten Viber, Syteca, and Vectra …

Nirmata Control Hub automates security with policy-as-code
Nirmata launched Nirmata Control Hub, a comprehensive platform designed to prevent misconfigurations and automate security through policy-as-code. As Artificial Intelligence …

Nirmata Policy Manager combats cloud security threats
Nirmata announced new features for its flagship product, Nirmata Policy Manager. With today’s increasing cloud security threats, detecting intrusions is no longer enough …

CoreStack partners with Nirmata to help enterprises protect and govern Kubernetes workloads
CoreStack announced its strategic partnership with Nirmata, a software solutions provider for policy-based security and automation of production Kubernetes workloads and …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility