Insights into insider threats: Detecting and monitoring abnormal user activity

A cyber security risk that comes from within an organization is referred to as an insider threat. Insider threats might be carried out purposefully or accidentally. Whatever the motivation,... Read more »

PCI Secure Software Standard 1.2 released

PCI Security Standards Council (PCI SSC) published version 1.2 of the PCI Secure Software Standard and its supporting program documentation. The PCI Secure Software Standard is one of two... Read more »

Why automation is critical for scaling security and compliance

As companies are modernizing their tech stacks, many are unwittingly putting their business and customers at risk. Why? Because technology moves faster than teams can keep pace and it’s... Read more »

Leveraging the full potential of zero trust

More than 90% of IT leaders who have started migrating to the cloud have implemented, are implementing, or are planning to implement a zero-trust security architecture, according to Zscaler.... Read more »

OPSWAT MetaDefender Cloud Email Security protects users against zero-day threats

OPSWAT announced that its MetaDefender Email Gateway Security solution is now available from the cloud as a service, known as MetaDefender Cloud Email Security. This new offering gives organizations... Read more »

HackNotice 4.0 allows companies to craft custom phishing templates

HackNotice unveils new platform features, a new logo and wordmark, dark mode, personalized dashboards, risk meters, easier-to-understand alerts, more powerful monitoring, continuous phishing with the press of a button,... Read more »

Delinea Privilege Manager enhancements reduce risk of cyber attacks through workstations

Delinea announced new features for Privilege Manager, its solution for managing privileged access on Windows and Mac workstations. Updates in this release include improvements to the native MacOS agent,... Read more »

Rezilion updates its vulnerability risk determination tool MI-X

Rezilion has updated MI-X, its open-source tool developed by Rezilion’s vulnerability research team. Available as a download from the Github repository, MI-X already has more than 100 stars on... Read more »

Cradlepoint Zero Trust Network Access helps enterprises manage user-to-application access

Cradlepoint unveils its third NetCloud Exchange (NCX) solution, Zero Trust Network Access. NCX ZTNA ensures a native ZTNA experience that offers simplicity, efficiency, and granularity for Cradlepoint deployments. While... Read more »

Beyond Identity and Zscaler join forces to strengthen zero trust security strategies

Beyond Identity and Zscaler joint solution strengthens a zero trust architecture and reduces the attack surface by continuously validating the user and device and enabling secure access to applications.... Read more »
Subscribe to our Newsletter