Appdome has released its next generation ThreatScope product, delivering Extended Detection and Response (XDR) for consumer mobile apps and brands globally. Mobile brands gain the power and agility of... Read more »
Radiant Logic announced redesigned Identity Data Platform, offering an identity-first approach to security and business decisions. To drive confident policies, enterprises need real-time access to a tremendous amount of... Read more »
Pliant launched Observability Automation solution developed specifically for leading performance monitoring vendors and their customers. The Pliant Observability Solution elevates performance monitoring for operations teams at large enterprises, carriers,... Read more »
ReasonLabs FamilyKeeper parental control app helps make parenting easier in the digital world by equipping parents with the tools they need to protect their kids online. Data shows that... Read more »
ThreatNG announced its agentless Cloud and SaaS Exposure Module as a part of its External Attack Surface Management (EASM) and Digital Risk solution. The ThreatNG “Cloud and SaaS Exposure”... Read more »
Otorio and Compugen have formed a business partnership to protect customers against industrial cyber threats to OT environments. Through the alliance, Otoeio’s comprehensive OT solution and Compugen’s professional services... Read more »
With access control as a cornerstone of physical security, and today’s businesses requiring more advanced tools, Axis Communications and Genetec have partnered to introduce an enterprise-level access control solution.... Read more »
HCLSoftware and SolarWinds are expanding their partnership to build an end-to-end 5G network observability platform from Cloud to RAN (Radio Access Network). This joint AI-based solution combines HCLSoftware’s Augmented... Read more »
InQuest appointed Darren Spruell, a seasoned information security professional, as its Chief Intelligence Officer. Darren brings an array of technical skills bolstered by intense curiosity and a passion for... Read more »
Attackers can exfiltrate company data stored in Google Cloud Platform (GCP) storage buckets without leaving obvious forensic traces of the malicious activity in GCP’s storage access logs, Mitiga researchers... Read more »
