Industry news
KasadaIQ for Fraud enables enterprises to predict and prevent account takeover
Kasada announced KasadaIQ, its new suite of attack prediction services. The first service in this suite — KasadaIQ for Fraud — supplies actionable signals, collected across …
Illumio CloudSecure addresses attacks across hybrid and multi-cloud environments
Illumio has expanded its Zero Trust Segmentation Platform with Illumio CloudSecure, enhancing its segmentation portfolio to address attacks across hybrid and multi-cloud …
Lacework unifies code and cloud security
Lacework announced its release of code security, which provides Lacework customers full visibility throughout the complete application development lifecycle. Lacework code …
SolarWinds expands observability offering to provide enterprises with full visibility into databases
SolarWinds announced major enhancements in its Database Observability capability within the cloud-based SolarWinds Observability platform. SolarWinds Database Observability …
OneSpan DIGIPASS FX1 BIO protects against social engineering and account takeover attacks
OneSpan introduced its latest innovation to the Digipass Authenticators product line, with DIGIPASS FX1 BIO. This physical passkey with fingerprint scan empowers organizations …
IBM watsonx.governance manages, monitors, and governs AI models
IBM announced that watsonx.governance will be generally available in early December to help businesses shine a light on AI models and eliminate the mystery around the data …
6clicks helps organizations manage and report on material cybersecurity events
6clicks announced that it has added SEC Form 8-K content required for event tracking to its incident management module in its GRC platform to help organizations meet new SEC …
Aikido Security raises €5 million to simplify SaaS security
Aikido Security has raised €5 million in a seed funding round co-led by Notion Capital and Connect Ventures; with investment from Inovia Capital Precede Fund I, led by …
Palo Alto Networks adds BYOML framework to Cortex XSIAM 2.0
It used to take an attacker 44 days on average to exfiltrate data from an organization once it was compromised — now it’s a matter of hours — and with companies taking …
Impinj R720 reader optimizes speed and automation in supply chain and logistics
Impinj announced the Impinj R720 RAIN RFID reader. With more processing power and memory than Impinj’s prior-generation reader, the Impinj R720 speeds edge processing and …
PCI Pal and Zoom join forces to secure payment process for customers
PCI Pal has joined forces with Zoom Video Communications to deliver an improved customer experience through the integration of PCI Pal Agent Assist and Digital Payments …
Qohash unveils remediation features for enhanced data security
Qohash introduces data remediation features to bolster organizations’ security and risk management. With this addition, the Qostodian platform now offers end-to-end …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?