Jetico released an update of BCWipe Total WipeOut. Addressing concerns of meeting the NIST hard drive wipe requirements, the new version of the software allows users to erase hard... Read more »
VikingCloud announced THOR AI (Threat Hunting and Orchestrated Response), a generative AI-powered cybersecurity chatbot. The new complimentary cyber defense tool is designed to assist companies of all sizes find... Read more »
Omada introduced the next generation of Omada Identity Cloud, Horizons. Built on a modern, cloud-native microservice architecture, Omada will deliver speed, intelligent decision support, connectivity and higher operational efficiency.... Read more »
Aim Security announced $10 million in seed funding, led by YL Ventures, with participation from CCL (Cyber Club London), the founders of WIZ and angel investors from Google, Proofpoint... Read more »
ProcessUnity announced the completed integration of the Global Risk Exchange, making it the all-in-one risk platform for modernizing TPRM (Third-party risk management). Now, via a single combined offering, risk... Read more »
Veza announced an integration with Google Drive, the popular file storage and synchronization service. With this integration, Veza customers can now secure access to files like docs and spreadsheets... Read more »
White Phoenix is a free ransomware recovery tool for situations where files are encrypted with intermittent encryption. It was tested on BlackCat/ALPHV Ransomware, Play Ransomware, Qilin/Agenda Ransomware, BianLian Ransomware,... Read more »
The newest version of the vulnerability scoring system CVSS 4.0 is here! After a lengthy gap between version 3 (released in 2015), as of November 2023 version 4.0 is... Read more »
In this Help Net Security interview, Stephanie Hagopian, VP of Security at CDW, discusses offensive strategies in the face of complex cyberattacks and the role of the zero-trust model.... Read more »
According to a recent Dynatrace report, only 50% of CISOs believe that development teams have thoroughly tested the software for vulnerabilities before deploying it into the production environment. This... Read more »
