Please turn on your JavaScript for this page to function normally.
KasadaIQ for Fraud enables enterprises to predict and prevent account takeover

Kasada announced KasadaIQ, its new suite of attack prediction services. The first service in this suite — KasadaIQ for Fraud — supplies actionable signals, collected across …

Illumio CloudSecure addresses attacks across hybrid and multi-cloud environments

Illumio has expanded its Zero Trust Segmentation Platform with Illumio CloudSecure, enhancing its segmentation portfolio to address attacks across hybrid and multi-cloud …

Lacework unifies code and cloud security

Lacework announced its release of code security, which provides Lacework customers full visibility throughout the complete application development lifecycle. Lacework code …

SolarWinds expands observability offering to provide enterprises with full visibility into databases

SolarWinds announced major enhancements in its Database Observability capability within the cloud-based SolarWinds Observability platform. SolarWinds Database Observability …

OneSpan DIGIPASS FX1 BIO protects against social engineering and account takeover attacks

OneSpan introduced its latest innovation to the Digipass Authenticators product line, with DIGIPASS FX1 BIO. This physical passkey with fingerprint scan empowers organizations …

IBM watsonx.governance manages, monitors, and governs AI models

IBM announced that watsonx.governance will be generally available in early December to help businesses shine a light on AI models and eliminate the mystery around the data …

6clicks helps organizations manage and report on material cybersecurity events

6clicks announced that it has added SEC Form 8-K content required for event tracking to its incident management module in its GRC platform to help organizations meet new SEC …

Aikido Security raises €5 million to simplify SaaS security

Aikido Security has raised €5 million in a seed funding round co-led by Notion Capital and Connect Ventures; with investment from Inovia Capital Precede Fund I, led by …

Palo Alto Networks adds BYOML framework to Cortex XSIAM 2.0

It used to take an attacker 44 days on average to exfiltrate data from an organization once it was compromised — now it’s a matter of hours — and with companies taking …

Impinj R720 reader optimizes speed and automation in supply chain and logistics

Impinj announced the Impinj R720 RAIN RFID reader. With more processing power and memory than Impinj’s prior-generation reader, the Impinj R720 speeds edge processing and …

PCI Pal and Zoom join forces to secure payment process for customers

PCI Pal has joined forces with Zoom Video Communications to deliver an improved customer experience through the integration of PCI Pal Agent Assist and Digital Payments …

Qohash unveils remediation features for enhanced data security

Qohash introduces data remediation features to bolster organizations’ security and risk management. With this addition, the Qostodian platform now offers end-to-end …

Don't miss

Cybersecurity news