NXP Semiconductors has released new devices designed to simplify the development of IoT and industrial IoT solutions. Adding to NXP’s expanding portfolio of end-to-end Matter solutions, the RW612 and... Read more »
Living Security and GuidePoint Security collaboration will deliver Living Security’s Human Risk Management solutions and security awareness training to even more organizations within GuidePoint Security’s ecosystem. Cybersecurity incidents continue... Read more »
Stellar Cyber and Deep Instinct integration makes it easy for enterprise and MSSP customers using the Stellar Cyber Open XDR platform to deliver Deep Instinct’s prevention capabilities across the... Read more »
Palo Alto Networks has expanded partnership that brings together BeyondCorp Enterprise from Google Cloud and Prisma Access from Palo Alto Networks to provide hybrid users secure and seamless access... Read more »
DH2i’s DxEnterprise multi-platform smart high availability clustering software has earned Red Hat OpenShift certification on Red Hat Enterprise Linux. This certification verifies that DxEnterprise is a containerized solution that... Read more »
FireTail has closed $5 million in early stage financing led by Paladin Capital Group, with participation from Zscaler, General Advance, Secure Octane, and a cadre of high-profile cyber security... Read more »
As Acalvio Technologies CMO, Anand Akela will play an integral role in driving the company’s marketing strategy as the company expands into identity threat detection and response (ITDR). With... Read more »
Corey Williams will leverage his extensive cybersecurity background to lead Skybox Security’s core marketing strategy and accelerate market growth. The seasoned marketing executive brings 25 years of experience leading... Read more »
After releasing the Open Source Vulnerabilities database (OSV.dev) in February, Google has launched the OSV-Scanner, a free command line vulnerability scanner that open source developers can use to check... Read more »
The importance of threat detection cannot be overstated. A recent Verizon study revealed that the top discovery method (more than 50%) for breaches is in fact disclosure by the... Read more »