Most security pros turn to unauthorized AI tools at work

Security experts are increasingly resorting to unauthorized AI tools, possibly because they are unhappy with the level of automation implemented in their organization’s security operation centers (SOCs), according to... Read more »

Tracking the global spread of malware

Approximately 10-16 percent of organizations have shown evidence of malicious command and control (C2) activities, strongly indicating a network breach within the last year, according to Akamai. Emotet and... Read more »

Elevate Identity enables security teams to automate customization of conditional access policies

Elevate Security has released Elevate Identity, its SaaS offering for Identity and Access Management (IAM) Professionals that integrates Elevate’s user risk profiling capability with IAM tools such as Cisco... Read more »

BIgID’s secrets detection capabilities reduce risk from potential data breaches and leaks

BigID has introduced purpose-built AI and ML-based data discovery and classification capabilities designed to detect secrets across enterprise data and reduce risk from potential data breaches and leaks. Secrets... Read more »

Dell’s new security offerings help enterprises secure their devices, systems and clouds

Dell Technologies has unveiled new security services and solutions to help organizations protect against threats, respond to attacks and secure their devices, systems and clouds. Seventy-two percent of IT... Read more »

Perception Point adds DLP capabilities to detect, prevent, and remediate web threats

Perception Point has added browser-centric Data Loss Prevention (DLP) capabilities to its Advanced Browser Security extension. The Browser Security plugin provides comprehensive security measures and granular controls to safeguard... Read more »

HYPR launches Enterprise Passkeys for Microsoft Azure

HYPR announced its newest offering, Enterprise Passkeys for Microsoft Azure and integrated with Microsoft Entra. This new technology turns any smartphone into a FIDO2 virtual security key, providing authentication... Read more »

Atakama Enterprise protects unstructured data against exfiltration

Atakama unveiled its new Multifactor Encryption platform, Atakama Enterprise, featuring the Atakama Intelligence Center. Atakama’s Multifactor Encryption combines advanced Distributed Key Management (DKM) with the proven concept of multi-device... Read more »

Splunk Your Way with BlueVoyant help users streamline cyber threat detection

BlueVoyant has enhanced Splunk capabilities, with end-to-end consulting, implementation, and Managed Detection & Response (MDR) services. With the increasing adoption of cloud technologies, organizations face a complex and rapidly... Read more »

Trustwave partners with Trellix to improve detection and response for security teams

Trustwave and Trellix have formed a strategic partnership to bring visibility and more precise detection and response to security teams defending against cyberthreats. Trustwave’s Managed Detection and Response (MDR)... Read more »
Subscribe to our Newsletter