Delinea Privilege Manager enhancements reduce risk of cyber attacks through workstations

Delinea announced new features for Privilege Manager, its solution for managing privileged access on Windows and Mac workstations. Updates in this release include improvements to the native MacOS agent,... Read more »

Rezilion updates its vulnerability risk determination tool MI-X

Rezilion has updated MI-X, its open-source tool developed by Rezilion’s vulnerability research team. Available as a download from the Github repository, MI-X already has more than 100 stars on... Read more »

Cradlepoint Zero Trust Network Access helps enterprises manage user-to-application access

Cradlepoint unveils its third NetCloud Exchange (NCX) solution, Zero Trust Network Access. NCX ZTNA ensures a native ZTNA experience that offers simplicity, efficiency, and granularity for Cradlepoint deployments. While... Read more »

Beyond Identity and Zscaler join forces to strengthen zero trust security strategies

Beyond Identity and Zscaler joint solution strengthens a zero trust architecture and reduces the attack surface by continuously validating the user and device and enabling secure access to applications.... Read more »

Vaultree raises $12.8 million

Vaultree has closed a $12.8 million series A growth investment round, bringing the company’s total funding to $16.1 million. The series A investment is led by Molten Ventures together... Read more »

Interpres Security emerges from stealth and raises $8.5 million

Interpres Security announced its emergence from stealth alongside $8.5M in seed financing led by Ten Eleven Ventures. The Interpres Security platform offers a customized, continuous, and threat-informed analysis of... Read more »

Apple unveils end-to-end encryption for iCloud backup, Photos, etc.

Apple is expanding end-to-end encryption options for users and finally offering E2EE for their iCloud backup. Advanced Data Protection for iCloud “iCloud already protects 14 sensitive data categories using... Read more »

Data protection and security in 2023

Change is the only constant. How we think about data protection, rules and regulations, and the changing of organizational structure is evolving. The good news is that companies and... Read more »

Cybercriminals are scamming each other, tipping off law enforcement

Cybercriminals are scamming each other out of millions of dollars and use arbitration to settle disputes about the scams, according to Sophos. For this report, Sophos experts investigated two... Read more »

How IoT is changing the threat landscape for businesses

Where IoT-enabled devices connect to wider networks, their potential functionalities are immense, with countless applications across various industries, including production and manufacturing, healthcare, finance, and energy. In this Help... Read more »
Subscribe to our Newsletter