Cerbos Cloud manages and enforces authorization policies

Cerbos has released Cerbos Cloud, a managed service offering for Cerbos. Cerbos is an open source authorization layer to easily implement roles and permissions in software applications. It separates... Read more »

Cymulate ASM bridges vulnerability management and ASM gaps in hybrid infrastructure

Cymulate has expanded its Attack Surface Management (ASM) solution to close gaps between traditional vulnerability management and ASM. Organizations will now have advanced capabilities to easily visualize risky exposures... Read more »

CircleCI adds more security and compliance capabilities to its platform

CircleCI has unveiled a new suite of platform capabilities and integrations. Today, software teams are building at greater velocity while relying on a variety of dependent software. And with... Read more »

Arcitecta unveils Point in Time Ransomware Rapid Recovery Solution

Arcitecta has launched its Point in Time Ransomware Rapid Recovery Solution for the media and entertainment industry. The new solution provides studios with instant recovery from a ransomware attack,... Read more »

SentinelOne announces integration of firewalls and NDR capabilities with key industry players

SentinelOne has unveiled integrations with key industry players Aruba, Checkpoint, Cisco, Darktrace, Extrahop, Fortinet, Palo Alto Networks and an enhanced collaboration with Vectra AI which expand the company’s firewall... Read more »

DirectDefense and Claroty join forces to secure XIoT environments

DirectDefense has partnered with Claroty which empowers organizations with visibility, protection, and threat detection to secure their Extended Internet of Things (XIoT), a vast network of cyber-physical systems across... Read more »

Google delivers secure open source software packages

Google has announced the Google Cloud Assured Open Source Software (Assured OSS) service, which aims to be a trusted source of secure open source packages, and the deps.dev API,... Read more »

LinkedIn now allows you to verify your workplace

To combat the surge of fake LinkedIn accounts in recent years, Microsoft has introduced Entra Verified ID, a new feature that allows users to verify their workplace on the... Read more »

The new weakest link in the cybersecurity chain

It used to be that people were the greatest cybersecurity vulnerability, but this is no longer true. The rise of the internet made people more connected than ever. Attackers... Read more »

5 steps to building NSA-level access control for your app

Access control has become a main concern when it comes to developing secure web applications, and the NSA has a lot to say about it. Especially when it comes... Read more »
Subscribe to our Newsletter