Attack surface management (ASM) is not limited to the surface

Another year of high-profile cyberattacks, another year of beating the cybersecurity drums. Clearly, we’re missing a few notes. Attack surface management (ASM) is a make or break for organizations,... Read more »

Introducing the book – Threats: What Every Engineer Should Learn From Star Wars

Adam Shostack, the author of “Threat Modeling: Designing for Security”, and the co-author of “The New School of Information Security”, recently launched his new book – “Threats: What Every... Read more »

Combining identity and security strategies to mitigate risks

Last week, the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral resources to help organizations reduce the risk of a breach by combining identity and security strategies,... Read more »

The risks and benefits of starting a vCISO practice

There is a definite trend of MSPs shifting into security. There are a number of very good reasons for this, including the fact that other services traditionally offered are... Read more »

Finite State releases Next Gen Platform for software supply chain security

Finite State has released its Next Generation Platform featuring extended SBOM management with the ability to ingest and aggregate 120+ external data sources. The new platform gives Application and... Read more »

CyberSaint Executive Dashboard empowers CISOs to take control of cyber risk communication

CyberSaint’s Executive Dashboard allows CISOs to present their cyber risk posture to the rest of the C-suite and Board of Directors in a credible, financially quantifiable manner that enables... Read more »

ThreatBlockr platform updates prioritize alert management

ThreatBlockr introduced major updates and features to its platform. The release improves flexibility, control, and visibility, with key updates including list consolidation, simplified policy configuration, easier protection of networks... Read more »

Akamai Connected Cloud helps enterprises deploy and secure distributed applications

Akamai Technologies has launched Akamai Connected Cloud, a massively distributed edge and cloud platform for cloud computing, security, and content delivery that keeps applications and experiences closer and threats... Read more »

SynSaber OT PCAP Analyzer simplifies the network analysis process

SynSaber has launched OT PCAP Analyzer tool that allows users to view a high-level breakdown of the device and protocol information contained within a packet capture (PCAP) file. SynSaber’s... Read more »

Ping Identity and Deloitte secure identities and data across digital engagement channels

Ping Identity has formed a new strategic alliance with Deloitte to help the organizations’ shared clients improve advanced Identity Access Management (IAM) Solutions selection and onboarding. Through the alliance,... Read more »
Subscribe to our Newsletter