Please turn on your JavaScript for this page to function normally.
SecLytics

LogRhythm and SecLytics offer cybersecurity solutions for Middle East organizations
LogRhythm has partnered with SecLytics to transform the security posture and streamline operations for security operations center (SOC) teams in the Middle East. LogRhythm and …

Infosec products of the month: October 2021
Here’s a look at the most interesting products from October, featuring releases from Abnormal Security, Aqua Security, AT&T, Avast, Datto, Data Theorem, Huntress, Jumio, …

New infosec products of the week: October 22, 2021
Here’s a look at the most interesting product releases from the past week, featuring releases from SecLytics, SecurID, Splunk, ThreatConnect and ZeroFox. ThreatConnect …

SecLytics Augur pXDR reduces risk while streamlining SOC operations
SecLytics unveils its Augur pXDR (Predictive Extended Detection and Response Platform). Building off SecLytics’ patented Augur predictive intelligence technology, Augur pXDR …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility