Yeti serves as a unified platform to consolidate observables, indicators of compromise, TTPs, and threat-related knowledge. It enhances observables automatically, such as domain resolution and IP geolocation, saving you... Read more »
Can our bodies be hacked? The answer may be yes, in that anyone can implant a chip under the skin and these devices do not usually use secure technologies,... Read more »
74% of CEOs are concerned about their organizations’ ability to avert or minimize damage to the business from a cyberattack – even though 96% of CEOs said that cybersecurity... Read more »
DAT Freight & Analytics introduced an innovative new risk assessment engine that uses artificial intelligence and DAT’s extensive proprietary data to give customers an insight into a potential partner’s... Read more »
Appdome released new threat evaluation tools inside ThreatScope Mobile XDR to deliver enhanced monitoring, investigation and threat evaluation for mobile apps and brands globally. Among the new tools is... Read more »
Honeywell launched Cyber Watch, an enterprise solution designed to help organizations better identify, mitigate and manage the latest OT cyber threats. “Everyone from the plant manager to the CISO... Read more »
OpenText introduced OpenText Aviator AI capabilities in Cloud Editions 23.4. For over a decade, OpenText has been helping organizations manage and secure large complex data sets from IoT and... Read more »
BT and Google Cloud announced a new partnership focusing on an enhanced commitment to cybersecurity innovation. Serving customers in more than 180 countries and with a team of 3,000... Read more »
Veza launched its Next-Gen IGA (Identity Governance and Administration) solution. The solution comprises the Veza Access Control Platform and new products for provisioning and deprovisioning, access reviews, access visibility,... Read more »
Ashade Tech launched TrustPattern, a technology that facilitates storing information on any surface using image pattern recognition. The technology encodes data using advanced computer algorithms, generating image patterns that... Read more »
