Industry news
Loft Labs simplifies multi-cluster Kubernetes management for Rancher users
Loft Labs announced vCluster for Rancher, enabling self-service virtual Kubernetes cluster creation and management for teams already using Rancher for Kubernetes management. …
Perception Point GPThreat Hunter allows cybersecurity experts to focus on in-depth investigations
Perception Point launched its latest innovation, GPThreat Hunter, an addition to the company’s comprehensive security stack. Leveraging the capabilities of …
Cado Security enables organizations to investigate and respond to potential M365 threats
Cado Security announced that the Cado platform now enables customers to acquire Microsoft 365 Unified Audit Log (UAL) to help investigate and respond to Microsoft 365 …
QuProtect Core Security secures Cisco routers against quantum threats
QuSecure unveiled QuProtect Core Security, a product designed to fortify existing Cisco router-to-router communications against emerging quantum threats. Leveraging advanced …
Halo Security Dark Web Monitoring identifies and mitigates potential exposures
Halo Security intoduced its new Dark Web Monitoring feature. This addition further enhances the company’s external security platform, allowing security teams to gain …
Concentric AI introduces Copilot data risk module
Concentric AI announced its new Copilot data risk module that delivers data security governance of Copilot data inputs and outputs to ensure that sensitive data – from …
Tenable enhances ExposureAI capabilities to directly query AI engine and reduce risk
Tenable has unveiled enhancements to ExposureAI, the generative AI capabilities and services within its Tenable One Exposure Management Platform. The new features enable …
DataDome Ad Protect detects fraudulent ad traffic
DataDome launched DataDome Ad Protect, designed to combat fraudulent traffic affecting digital ad campaigns. This solution is set to transform how organizations manage and …
New Relic empowers IT and engineering teams to focus on real application security problems
New Relic launched new capabilities for New Relic IAST (Interactive Application Security Testing), including proof-of-exploit reporting for application security testing. New …
Trellix secures sensitive and proprietary information with new protections for macOS
Trellix announced new macOS Trellix Data Loss Prevention Endpoint Complete capabilities to better secure sensitive and proprietary information from accidental or intentional …
Regula 4205D updates help border control authorities fight identity document fraud
The International Organization for Migration reports that the migrant flow has been steadily rising, with the numbers swelling from 153 million in 1995 to 281 million in 2022. …
Stellar Cyber and Torq join forces to deliver automation-driven security operations platform
Stellar Cyber announced a technology partnership with Torq to help security teams dramatically improve their ability to combat advanced attacks. This partnership combines the …
Featured news
Resources
Don't miss
- 48,000+ internet-facing Fortinet firewalls still open to attack
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats