Deep Instinct Prevention for Storage fills gaps in data protection left by legacy tools

Deep Instinct launched Deep Instinct Prevention for Storage (DPS). The new offering applies a prevention-first approach to storage protection, wherever data is stored – Network Attached Storage (NAS), hybrid,... Read more »

Reusable Persona stores PII for reuse across any device or browser

Persona launched a new addition to its suite of identity solutions, “Reusable Personas”. Leveraging Passkeys, the new release enables users to securely store their Personal Identity Information (PII) for... Read more »

Veritas 360 Defense protects enterprise data and applications across clouds

Veritas Technologies announced Veritas 360 Defense, an extensible architecture in its space that brings together leading data protection, data governance, and data security capabilities. Veritas 360 Defense delivers a... Read more »

Centific and Prove Identity partner to bridge cybersecurity and fraud protection gap

Centific and Prove Identity have partnered to bridge the gap between cybersecurity and fraud protection. This initiative will redefine the digital security landscape by offering a holistic solution for... Read more »

Jumio 360° Fraud Analytics identifies patterns based on behavioral similarities

Jumio unveiled Jumio 360° Fraud Analytics, its new fraud-fighting technology that uses AI-driven predictive analytics to identify fraud patterns with more sophistication and accuracy. According to Jumio’s analysis, 25%... Read more »

Microsoft announces wider availability of AI-powered Security Copilot

Microsoft Security Copilot has been made available to a larger number of enterprise customers, via an invitation-only Early Access Program. What is Microsoft Security Copilot? “Security Copilot is an... Read more »

Unit21 Real-Time Monitoring empowers users to identify potential fraud

Unit21 launches Real-Time Monitoring to fight real-time fraud and transform the landscape of risk management. With Real-Time Monitoring, fraud prevention teams gain unprecedented capabilities to monitor real-time transactions which... Read more »

“Disappearing” implants, followed by first fixes for exploited Cisco IOS XE zero-day

Cisco has released the first fixes for the IOS XE zero-day (CVE-2023-20198) exploited by attackers to ultimately deliver a malicious implant. The fixes were made available on Sunday, but... Read more »

How passkeys are changing the face of authentication

As passwordless identity becomes mainstream, the term “passkey” is quickly becoming a new buzzword in cybersecurity. But what exactly is a passkey and why do we need them? A... Read more »

Navigating OT/IT convergence and securing ICS environments

Escalating threats to operational technology (OT) have prompted an increasing number of global enterprises to adopt sophisticated technologies and services to enhance the security of their assets. In this... Read more »
Subscribe to our Newsletter