Kroll expands recovery service for clients to manage vulnerabilities in their security posture

Kroll announced that it has expanded its recovery service for clients, including those responding to an incident and those acting on a resilience assessment to manage vulnerabilities and plug... Read more »

New infosec products of the week: May 27, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Corelight, Fortinet, Hunters, Kingston Digital, Netenrich, PIXM, and SafeGuard Cyber. PIXM Mobile provides real-time... Read more »

How to eliminate the weak link in public cloud-based multi-party computation

Secure multi-party computation (MPC) has seen steady evolution to tackle many scientific challenges. These include enabling the creation and tuning of AI or machine learning algorithms, as well as... Read more »

What is keeping automotive software developers up at night?

Perforce Software released the results of its annual State of Automotive Software Development survey conducted in partnership with Automotive IQ. Close to 600 automotive development professionals across the globe... Read more »

80% of consumers prefer ID verification when selecting online brands

Jumio released the findings of its global research conducted by Opinium, which shows the impact of the increasing use of digital identity on consumer preferences and expectations. The research... Read more »

Entrust CloudControl 6.5 improves enterprise security and control for multi-cloud deployments

Entrust is addressing the increasing complexities of securing multi-cloud environments with the launch of Entrust CloudControl 6.5 software, which enables organizations to automate both enterprise security policy and deployment... Read more »

Corelight Investigator allows security teams to accelerate their threat hunting and investigations

Corelight announced Corelight Investigator, a SaaS-based solution that extends the power of open-source driven network evidence to SOC teams everywhere. Investigator delivers advanced capabilities for transforming network and cloud... Read more »

Hunters SOC Platform enhancements enable users to prioritize incidents based on their urgency

Hunters announced new capabilities in the Hunters SOC Platform to enhance and accelerate security operations workflows for data ingestion and normalization, threat detection, investigation and response. The advances free... Read more »

LiveAction announces long-term behavioral analytics capabilities in its ThreatEye NV platform

LiveAction announced new long-term behavioral analytics capabilities in ThreatEye NV, its network detection and response platform (NDR). The platform combines next-generation data collection, advanced behavior analysis and streaming machine... Read more »

Uptycs enhances container and Kubernetes capabilities to minimize risk for security teams

Uptycs announced enhanced container and Kubernetes security posture management (KSPM) capabilities for its cloud workload protection platform (CWPP) offering. These capabilities provide real-time detection for containerized workloads, proactive scanning... Read more »
Subscribe to our Newsletter