Adaptive Shield reduces supply chain risks with SaaS-to-SaaS capabilities

Adaptive Shield announced new capabilities to discover and monitor 3rd party apps connected to the core SaaS stack. With this new capability, Adaptive Shield is minimizing the risk that... Read more »

AWS Supply Chain helps businesses optimize supply chain processes

Amazon Web Services (AWS) has unveiled AWS Supply Chain, a new application that helps businesses increase supply chain visibility to make faster, more informed decisions that mitigate risks, lower... Read more »

Viral Nation launches VN Secure to empower companies to monitor social media activity

Viral Nation launches VN Secure, an AI-powered solution for screening social media conduct across major platforms and all media types to help companies mitigate reputation risk and potential brand... Read more »

Sophos introduces new threat detection and response capabilities within its MDR offering

Sophos has released Sophos Managed Detection and Response (MDR) with new threat detection and response capabilities. Sophos is the endpoint security provider to integrate vendor agnostic telemetry from third-party... Read more »

Delinea unveils granular privilege elevation workflow for on-premise and cloud servers

Delinea announced the latest release of Cloud Suite, its solution that controls privileged access and authorization for on-premise and cloud servers. A new granular privilege elevation workflow allows users... Read more »

Infosec products of the month: November 2022

Here’s a look at the most interesting products from the past month, featuring releases from: Abnormal Security, Acronis, Bearer, Bitdefender, Clumio, Cohesity, Flashpoint, Forescout, ForgeRock, ImmuniWeb, Keyo, Lacework, LOKKER,... Read more »

Security pros feel threat detection and response workloads have increased

A new report conducted by Enterprise Strategy Group (ESG) highlights why today’s security teams find it increasingly difficult to detect and stop cyber threats targeting their organizations. The research... Read more »

Federal defense contractors are not properly securing military secrets

Defense contractors hold information that’s vital to national security and will soon be required to meet Cybersecurity Maturity Model Certification (CMMC) compliance to keep those secrets safe. Nation-state hackers... Read more »

IoT device origin matters more than ever

Recently, British politicians called on the government to crack down on the use of surveillance equipment from two Chinese companies, Hikvision and Dahua, which are already blacklisted by Washington.... Read more »

The impact of lay-offs on your organization’s cyber resilience

In this interview with Help Net Security, Ben Smith, Field CTO at NetWitness, talks about how the wave of lay-offs has impacted the cyber resilience of many businesses, but... Read more »
Subscribe to our Newsletter