Please turn on your JavaScript for this page to function normally.
Verint and Thales join forces to deliver cyber threat intelligence approach

Verint Systems and Thales formed a partnership to create a Cyber Security Threat Intelligence approach for governments, enterprises, and critical infrastructures in Europe. …

IBM to acquire Red Hat for $34 billion

IBM and Red Hat announced have reached a definitive agreement under which IBM will acquire all of the issued and outstanding common shares of Red Hat for $190.00 per share in …

A10 Networks delivers automation, analytics and multi-cloud management advancements to its ADCs

A10 Networks launched advancements to its Thunder Application Delivery Controllers (ADCs) with Harmony Controller support for centralized, multi-cloud management, per-app …

FaceShield launches to protect your digital facial data and privacy online

Each time you upload a photo of yourself online, your personal data – including age, ethnicity, gender and more – is subject to exploitation by third-party companies without …

SyncDog’s partners with Quick Heal Technologies

SyncDog unveiled that Quick Heal Technologies has embedded SyncDog’s Secure.Systems workspace into their Mobile Device Management (MDM) solution to expand their offering and …

Pokémon chooses Vera’s data-centric security platform to protect critical IP worldwide

Vera unveiled that The Pokémon has chosen Vera as the company’s enterprise standard for data security and rights management. Responsible for brand management, licensing, and …

Data Theorem introduces automated API discovery and security inspection solution

Data Theorem introduced today the industry’s first automated API discovery and security inspection solution aimed at addressing API security threats introduced by today’s …

Unidirectional Security Gateways provide safe IT/OT integration to Chinese industry

Waterfall’s flagship products were awarded China Compulsory Product Certification (CCC). The CCC Mark is essential for any manufacturer selling to Chinese manufacturers, …

High-Tech Bridge to leverage AI and Big Data to map application security risks and threats

High-Tech Bridge launched ImmuniWeb Discovery AI to conduct the threat-aware risk assessment and inventory of websites and web applications. Insecure and outdated web …

The new Code42 Next-Gen DLP solution delivers policy-free insider threat detection

Code42 introduced the Code42 Next-Gen Data Loss Protection (Code42 Next-Gen DLP) solution. Designed to help resource- and budget-constrained security and IT teams, the …

First release of StarlingX open source edge cloud software now available

StarlingX — the open source edge computing and IoT cloud platform optimized for low latency and high performance applications — is available in its first release. The project …

StackRox delivers Kubernetes security and compliance for Mux

StackRox unveiled that Mux has deployed the StackRox Container Security Platform to protect its microservices and container environments in Amazon Web Services (AWS) and …

Don't miss

Cybersecurity news