Armorblox released a report which highlights the use of language-based attacks that bypass existing email security controls. The report uncovers how the continued increase in remote work has made... Read more »
When a driverless car is in motion, one faulty decision by its collision-avoidance system can lead to disaster, but researchers at the University of California, Irvine have identified another... Read more »
Semperis released Purple Knight Post-Breach, a channel-only edition of its free Active Directory (AD) security assessment tool, to help service providers conduct attack mitigation and recovery for their customers... Read more »
Horizon3.ai announced it has extended the capabilities of its NodeZero platform to include external penetration testing. With this enhancement, Horizon3.ai is the first autonomous penetration testing platform to offer... Read more »
ESET has announced a new suite of products for the Telecommunications and Internet Service Provider (Telco and ISP) industry, with the aim of offering extensive protection to consumers. Cybercrime... Read more »
SecureAuth unveiled the launch of Arculix, a platform that combines orchestration, passwordless technology, and continuous authentication. The next generation platform has the flexibility to be deployed as a full... Read more »
Tufin announced the release of Tufin Orchestration Suite R22-1, enabling users to increase their security posture by gaining visibility and control of Azure Firewall policies. The release also features... Read more »
One problem many SMBs face is having adequate resources to manage and maintain good security practices. To help augment IT teams, SecurityMetrics created Pulse, a platform that provides SMBs... Read more »
Mirato announced its new mitigation planning feature, designed to build plans to fix and mitigate risk issues that emerge out of the TPRM due-diligence process, including failed controls, cyber-attacks,... Read more »
LookingGlass Cyber Solutions announced the release of LookingGlass Suite, which provides cybersecurity executives and their teams with a more holistic assessment of their organization’s cyber risk by mimicking the... Read more »
