AppViewX KUBE+ secures containerized workloads and Kubernetes infrastructure

AppViewX launched AppViewX KUBE+, a comprehensive automated certificate lifecycle management solution for Kubernetes environments that prevents outages and reduces security vulnerabilities. By providing complete certificate visibility, end-to-end automation and... Read more »

Yubico FIDO Pre-reg provides passwordless onboarding and account recovery

Yubico announced the initial availability of FIDO Pre-reg, a capability that delivers secure and seamless passwordless onboarding and account recovery/reset from day one at scale for enterprises. Available exclusively... Read more »

Nutanix strenghtens cyber resilience with ransomware detection and recovery features

Nutanix announced new features in the Nutanix Cloud Platform to strengthen organizations’ cyber resilience against ransomware attacks on unstructured data. These new features, available in Nutanix Data Lens and... Read more »

Identity Threat Protection with Okta AI combats identity-based attacks

Okta announced Identity Threat Protection with Okta AI (Identity Threat Protection), a new product for Okta Workforce Identity Cloud that delivers real-time detection and response for identity-based threats. Built... Read more »

Qualcomm patches 3 actively exploited zero-days

Qualcomm has fixed three actively exploited vulnerabilities (CVE-2023-33106, CVE-2023-33107, CVE-2023-33063) in its Adreno GPU and Compute DSP drivers. Vulnerabilities exploited in Qualcomm GPU and DSP drivers The US-based semiconductor... Read more »

Azul Code Inventory identifies dead and unused source code for removal

Azul announced Code Inventory, a new feature of Azul Vulnerability Detection that provides developers and DevOps teams a precise catalog of the source code actually used in production by... Read more »

Cloaked’s privacy app and web-based platform put people in control of their personal data

Cloaked has launched its privacy app and web-based platform that gives people control of their personal data by creating unlimited, secure identities, including working phone numbers, emails, usernames and... Read more »

Elevate Security Adaptive Trust helps security teams triage and prioritize security events

Elevate Security announced Adaptive Trust solution, enabling Microsoft customers deeper insight into high risk workers who are frequently targeted by attackers and enabling defenders to take action on these... Read more »

CellTrust and Theta Lake join forces to manage mobile communications risks

CellTrust has unveiled its SL2 product integration with Theta Lake to provide organizations with a solution for managing compliance and mitigating risks associated with mobile communications such as WhatsApp.... Read more »

Google unveils stricter anti-spam rules for bulk email senders

To keep Gmail users’ inboxes “safer and more spam-free”, Google is introducing new requirements for bulk senders (of commercial email). “Last year we started requiring that emails sent to... Read more »
Subscribe to our Newsletter