Monday, April 28, 2025 - Posts
-
Censys, known for its best-in-class Internet visibility, is launching a new solution specifically designed to enable threat hunting teams to track adversary infrastructure.... Read More...
|
-
Commvault announced highly differentiated capabilities with its Cleanroom Recovery offering that usher in a new era in end-to-end recovery following cyberattacks.... Read More...
|
-
Bugcrowd announced the launch of the first-ever offering to apply the scale, agility, and incentive-driven power of crowdsourcing to red teaming.... Read More...
|
-
Flashpoint announced the release of new robust capabilities to its flagship platform, Flashpoint Ignite, at the RSA Conference 2025... Read More...
|
-
Blackpoint Cyber unveiled CompassOne at RSAC 2025 and Kaseya Connect 2025-a Unified Security Posture and Response platform designed to help organizations take command of their entire cybersecurity posture-from visibility and prevention to response and recovery.... Read More...
|
-
ArmorCode in partnership with the Purple Book Community (PBC), a community of senior security leaders, released "The Rise of the AppSec Leader."... Read More...
|
-
Radware and SUSE announced a strategic partnership, offering service providers and enterprises a full stack, cloud-native Kubernetes solution designed to achieve low latency, high availability, and regulatory compliant outcomes.... Read More...
|
-
Sumo Logic announced a number of new security capabilities that help organizations build and operate intelligent security operations to reduce risks, accelerate threat containment, and ensure stronger security postures.... Read More...
|
-
Aqua Security unveiled the next phase of its AI security strategy with the introduction of Secure AI, full lifecycle security from code to cloud to prompt.... Read More...
|
-
Cisco made several transformative innovation and partnership announcements that will help security professionals secure and harness the power of AI.... Read More...
|
-
LevelBlue announced the launch of its 2025 Futures Report: Cyber Resilience and Business Impact at the RSAC Conference.... Read More...
|
-
The Cloud Security Alliance (CSA) has partnered with Northeastern University to develop the Trusted AI Safety Knowledge & Certification Program.... Read More...
|
-
Abnormal AI unveiled its most ambitious product release to date-introducing autonomous AI agents that revolutionize how organizations train employees and report on risk, while also evolving its email security capabilities to continue to stop the world's most advanced email attacks.... Read More...
|
-
Palo Alto Networks announced Prisma AIRS, a groundbreaking AI security platform that serves as the cornerstone for robust AI protection, designed to protect the entire enterprise AI ecosystem... Read More...
|
-
Cybernews researchers analyzed the top 100 most trusted companies in America - including Nvidia, Costco, Apple, American Express, and others - and found that all of them had experienced data breaches, exposing critical cybersecurity weaknesses.... Read More...
|
-
BeyondTrust launched the new Identity Security Risk Assessment, a free service designed to illuminate identity attack surfaces, so organizations can better manage risk and reduce vulnerabilities.... Read More...
|
-
Cribl announced a strategic partnership with Palo Alto Networks to accelerate AI-driven SecOps and enable customers to upgrade even faster from legacy SIEM solutions to a modern, AI-driven platform.... Read More...
|
-
Cequence Security announced significant enhancements to its Unified API Protection (UAP) platform to deliver the industry's first comprehensive security solution for agentic AI development, usage, and connectivity.... Read More...
|
-
Skyhigh Security announced the integration of Data Security Posture Management (DSPM) capabilities into its data-centric SSE platform.... Read More...
|
-
RSA announced groundbreaking cybersecurity innovations at RSAC Conference 2025 that defend organizations against the next wave of AI powered identity attacks, including IT Help Desk bypasses, malware, social engineering, and other threats.... Read More...
|
|
|