If your organization gets hit by a ransomware gang that has also managed to steal company data before hitting the “encrypt” button, which types of data are more likely... Read more »
Datadog launched Datadog Observability Pipelines, a new product that enables organizations to take greater control of their data so they can reliably scale their observability practices. Datadog Observability Pipelines... Read more »
Netacea released its report into how businesses are dealing with bot attacks. It reveals one key area where businesses are failing to tackle bot attacks — bots are going... Read more »
CyberArk announced new CyberArk Endpoint Privilege Manager functionality that extends protection to Linux platforms. Now, security and IT professionals can easily enforce least privilege and implement foundational just-in-time security... Read more »
Immersive Labs announced the launch of technical multiplayer simulations, including scenarios for both offensive and defensive teams in complex environments. This capability offers security teams the ability to use... Read more »
Portnox released a cloud-native Terminal Access Controller Access Control Server (TACACS+) solution to help midmarket businesses manage network device administration and access management across increasingly distributed networks. “We are... Read more »
According to Volexity, a webshell was discovered in Atlassian Confluence server during an incident response investigation. Volexity determined that it was a zero-day vulnerability that could execute remote code... Read more »
Here’s a look at the most interesting products from the past week, featuring releases from Black Kite, Feroot, Incognia, Optiv, and Splunk. Splunk announces platform updates to address the... Read more »
Fraud is a persistent threat, and there’s no end in sight as the e-commerce landscape continues to evolve and the use of online payment platforms increases. According to one... Read more »
Proofpoint unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk — vulnerability, attacks, and privilege — and how threat... Read more »
