Protecto boosts privacy protection with GPU technology from NVIDIA

Protecto announced it has been able to boost the performance of its privacy models on NVIDIA GPUs, allowing the discovery of privacy issues up to 10x faster than before.... Read more »

Intruder launches continuous attack surface monitoring for SMBs

Intruder has launched its continuous attack surface monitoring capabilities. The company’s new premium plan offering takes vulnerability management to the next level with continuous coverage, increasing visibility and transparency... Read more »

Kubeark unveils platform that empowers businesses to simplify technology operations management

Kubeark has unveiled its latest platform release that leverages the transformative potential of sky computing to empower enterprises to innovate and scale with unprecedented ease, regardless of their technology... Read more »

BSidesLjubljana 0x7E7 CFP is still open!

BSidesLjubljana 0x7E7, a non-profit conference organized by the information security community, will take place on June 16, 2023, at the C111 Computer Museum. The deadline for the call for... Read more »

How AI is reshaping the cybersecurity landscape

The success of ChatGPT, a text-generation chatbot, has sparked widespread interest in generative AI among millions of people worldwide. According to Jumio’s research, 67% of consumers globally are aware... Read more »

Amazon Inspector allows search of its vulnerability intelligence database

Amazon Inspector is designed to manage vulnerabilities by continuously scanning your AWS workloads for software vulnerabilities and unintended network exposure across your entire organization. Upon activation, Amazon Inspector automatically... Read more »

Top API vulnerabilities organizations can’t afford to ignore

75% of organizations typically change or update their APIs on a daily or weekly basis, creating a significant challenge for protecting the changing API attack surface, according to Data... Read more »

Unpaid open source maintainers struggle with increased security demands

Ensuring the security of the open-source software that modern organizations depend on is a crucial responsibility of the open source maintainers, especially as attacks on the software supply chain... Read more »

Keysight launches cybersecurity partnership program for MSSPs

Keysight Technologies has launched a new cybersecurity partnership program for managed security service providers (MSSP) to improve the security posture of organizations using the breach and attack simulation (BAS)... Read more »

Avetta releases Cyber Risk Solution for complete supply chain cyber health visibility

Avetta has released the Cyber Risk Solution, providing a quantitative score that evaluates cyber health in 10 areas and delivers an aggregate grade for each supplier. The Avetta One... Read more »
Subscribe to our Newsletter