Please turn on your JavaScript for this page to function normally.
Code42 Instructor now offers risk reduction training videos to Microsoft Teams

Code42 Software has offered a complete set of response controls to allow security teams to respond to all levels of risk, ranging from unacceptable high risk that must be …

Cerbos Cloud manages and enforces authorization policies

Cerbos has released Cerbos Cloud, a managed service offering for Cerbos. Cerbos is an open source authorization layer to easily implement roles and permissions in software …

Cymulate ASM bridges vulnerability management and ASM gaps in hybrid infrastructure

Cymulate has expanded its Attack Surface Management (ASM) solution to close gaps between traditional vulnerability management and ASM. Organizations will now have advanced …

CircleCI adds more security and compliance capabilities to its platform

CircleCI has unveiled a new suite of platform capabilities and integrations. Today, software teams are building at greater velocity while relying on a variety of dependent …

Arcitecta unveils Point in Time Ransomware Rapid Recovery Solution

Arcitecta has launched its Point in Time Ransomware Rapid Recovery Solution for the media and entertainment industry. The new solution provides studios with instant recovery …

SentinelOne announces integration of firewalls and NDR capabilities with key industry players

SentinelOne has unveiled integrations with key industry players Aruba, Checkpoint, Cisco, Darktrace, Extrahop, Fortinet, Palo Alto Networks and an enhanced collaboration with …

DirectDefense and Claroty join forces to secure XIoT environments

DirectDefense has partnered with Claroty which empowers organizations with visibility, protection, and threat detection to secure their Extended Internet of Things (XIoT), a …

Fleet MDM platform provides mobile workstation security with GitOps and workflow automation

Fleet has revealed a new programmable MDM, designed to give medium-to-large organizations control of remote workstation security with unsurpassed GitOps and workflow …

Searchlight Cyber launches Stealth Browser for secure dark web access

Searchlight Cyber has launched Stealth Browser, a virtual machine for cyber professionals to access the dark web and conduct investigations anonymously, without risk to …

Binarly Transparency Platform identifies vulnerabilities and malicious threats in code

Binarly has released the Binarly Transparency Platform, delivering transparency for device supply chains enabling device manufacturers and endpoint protection products to …

Regula updates Face SDK to protect users against different attack vectors

Regula has redesigned Face SDK face liveness detection technology and offers a balance between a simple UX and high reliability by using the zero-trust concept. Every session …

Rezonate’s new ITDR module empowers security teams to stop active threats in real-time

Rezonate’s ITDR offering detects and responds to active identity threats using both common and sophisticated techniques missed by traditional IAM solutions and endpoint …

Don't miss

Cybersecurity news