eBook: Keeping Active Directory out of hackers’ cross-hairs

Active Directory is a prime target for threat actors, and companies must act now to eliminate it as a threat vector permanently. Read the e-book to review: Active Directory... Read more »

Beyond Identity launches Okta Defense Kit to identify and prevent security vulnerabilities

Beyond Identity released the Okta Defense Kit, a duo of two preventative tools to help security and identity professionals identify and prevent security vulnerabilities, including those that contributed to... Read more »

Palo Alto Networks to acquire Talon Cyber Security

Palo Alto Networks has entered into a definitive agreement to acquire Talon Cyber Security, a pioneer of Enterprise Browser technology. Talon’s Enterprise Browser provides a solution that, combined with... Read more »

MITRE partners with Microsoft to address generative AI security risks

MITRE and Microsoft have added a data-driven generative AI focus to MITRE ATLAS, a community knowledge base that security professionals, AI developers, and AI operators can use as they... Read more »

Red Hat Device Edge ensures consistency across edge and hybrid cloud deployments

Red Hat has introduced Red Hat Device Edge, which offers a consistent platform designed for resource-constrained environments that necessitate small form-factor computing at the device edge. This includes Internet... Read more »

Wing Simulator enables developers to build and test Kubernetes applications

Wing Cloud, the company behind the open source programming language Winglang that works across all clouds, enhances their container support with the ‘Wing Simulator’ that enables developers to build... Read more »

RedSense Compromised Credential Services 2.0 helps users prevent future incidents

RedSense released RedSense Compromised Credential Services 2.0. The new services include RedSense Credential Alert and RedSense Credential Investigator. RedSense has pioneered the use of AI to optimize stolen credential... Read more »

Okta breach post mortem reveals weaknesses exploited by attackers

The recent breach of the Okta Support system was carried out via a compromised service account with permissions to view and update customer support cases. “During our investigation into... Read more »

Silobreaker AI enhances threat intelligence strategy

Silobreaker unveiled plans for its new generative AI tool, Silobreaker AI, which will provide assistance to threat intelligence teams tasked with collecting, analysing and reporting on intelligence requirements. With... Read more »

Google Play will mark independently validated VPN apps

Android VPN apps that have gone through an independent security validation will now be able to claim that distinction on Google Play with a prominent badge in their Data... Read more »
Subscribe to our Newsletter