What is keeping automotive software developers up at night?

Perforce Software released the results of its annual State of Automotive Software Development survey conducted in partnership with Automotive IQ. Close to 600 automotive development professionals across the globe... Read more »

80% of consumers prefer ID verification when selecting online brands

Jumio released the findings of its global research conducted by Opinium, which shows the impact of the increasing use of digital identity on consumer preferences and expectations. The research... Read more »

Entrust CloudControl 6.5 improves enterprise security and control for multi-cloud deployments

Entrust is addressing the increasing complexities of securing multi-cloud environments with the launch of Entrust CloudControl 6.5 software, which enables organizations to automate both enterprise security policy and deployment... Read more »

Corelight Investigator allows security teams to accelerate their threat hunting and investigations

Corelight announced Corelight Investigator, a SaaS-based solution that extends the power of open-source driven network evidence to SOC teams everywhere. Investigator delivers advanced capabilities for transforming network and cloud... Read more »

Hunters SOC Platform enhancements enable users to prioritize incidents based on their urgency

Hunters announced new capabilities in the Hunters SOC Platform to enhance and accelerate security operations workflows for data ingestion and normalization, threat detection, investigation and response. The advances free... Read more »

LiveAction announces long-term behavioral analytics capabilities in its ThreatEye NV platform

LiveAction announced new long-term behavioral analytics capabilities in ThreatEye NV, its network detection and response platform (NDR). The platform combines next-generation data collection, advanced behavior analysis and streaming machine... Read more »

Uptycs enhances container and Kubernetes capabilities to minimize risk for security teams

Uptycs announced enhanced container and Kubernetes security posture management (KSPM) capabilities for its cloud workload protection platform (CWPP) offering. These capabilities provide real-time detection for containerized workloads, proactive scanning... Read more »

Sungard AS Cyber Incident Recovery strengthens customers’ ability to recover data after a cyberattack

Sungard AS has launched a new Cyber Incident Recovery offering that enhances customers’ ability to swiftly and successfully recover data that’s been compromised from a cyberattack. The global cost... Read more »

Alteryx Designer-FIPS automates analytic insights and operational processes for government agencies

Alteryx announced Alteryx Designer-FIPS, a version of its flagship offering that is aligned with data security and computer system standards outlined in the Federal Information Processing Standards (FIPS). Now... Read more »

Linksys announces new series of WiFi 6 mesh solutions for all at-home needs

Linksys announced two new WiFi 6 mesh systems designed to deliver peak wireless performance for all at-home needs including remote working, streaming content, multi-user gaming and more. The Linksys... Read more »
Subscribe to our Newsletter