Stytch expands its platform to offer B2B authentication

Stytch’s new offering enables B2B products and applications to build and deliver the enterprise-grade authentication requirements that their customers require, while maintaining a frictionless user experience to maximize conversion... Read more »

Red Hat Trusted Software Supply Chain enhances an organization’s resilience to vulnerabilities

Red Hat announced Red Hat Trusted Software Supply Chain, a comprehensive solution that enhances resilience to software supply chain vulnerabilities. As part of this solution, two new cloud services,... Read more »

Fusion Risk Management TPRM enhancements deliver continuous monitoring of third parties

Fusion Risk Management announced expanded functionality of its third-party risk management (TPRM) offering. The enhanced solution delivers continuous monitoring of third parties beyond its traditional instance as well as... Read more »

IRONSCALES and Infinigate collaborate to provide customers with email security solution

IRONSCALES has partnered with the Infinigate Group to distribute IRONSCALES’ cloud email security platform in the Benelux, the Nordics, and Switzerland regions, with a view to widen the partnership... Read more »

Conceal and White Rock Cybersecurity partner to isolate browsing sessions

Conceal has announced a new strategic partnership with White Rock Cybersecurity. “White Rock Cybersecurity is committed to delivering innovative, scalable, and manageable solutions in information technology,” said James Range,... Read more »

N-able partners with JCDC to reduce security risk for MSPs

N-able is collaborating with the Joint Cyber Defense Collaborative (JCDC) to help create a more secure global ecosystem and work towards helping reduce security risk for MSPs and their... Read more »

WithSecure releases Cloud Security Posture Management to identify insecure cloud configurations

WithSecure has released Cloud Security Posture Management, a new module for its WithSecure Elements security platform, that identifies insecure cloud configurations attackers use to compromise networks. It’s now become... Read more »

Mastercard collaborates with HealthLock to protect medical data

Mastercard and HealthLock have partnered to offer millions of Americans help in protecting themselves against medical bill fraud, claim errors and overcharges. Consumers who link their insurance accounts to... Read more »

Simple OSINT techniques to spot AI-fueled disinformation, fake reviews

Error messages that ChatGPT and other AI language models generate can be used to uncover disinformation campaigns, hate speech and fake reviews via OSINT collection and analysis, says Nico... Read more »

7 access management challenges during M&A

Integrating an acquired company into a single organization is a daunting task that can take weeks, months, or even years to complete. To have a successful conclusion to the... Read more »
Subscribe to our Newsletter