8 Best Identity and Access Management (IAM) Solutions for 2023

Identity and access management software helps you maintain control of your environment by allowing authorized users to access company resources. Learn 10 of the top IAM tools to see... Read more »

Could C2PA Cryptography be the Key to Fighting AI-Driven Misinformation?

Adobe, Arm, Intel, Microsoft and Truepic put their weight behind C2PA, an alternative to watermarking AI-generated content. Read more »

Arc Browser Review (2023): Pricing, Features, Alternatives and More

Learn about Arc’s features, pros and cons, and what makes the web browser unique. Arc is available only for Mac and iPhone users. Read more »

LogRhythm vs Splunk (2023): SIEM tool comparison

This is a comprehensive LogRhythm vs Splunk SIEM tool comparison. Use our guide to learn more about features, pricing and more. Read more »

Assess multi-cloud security with the open-source CNAPPgoat project

Ermetic released CNAPPgoat, an open-source project that allows organizations to test their cloud security skills, processes, tools, and posture in interactive sandbox environments that are easy to deploy and... Read more »

Open-source penetration testing tool BloodHound CE released

SpecterOps released version 5.0 of BloodHound Community Edition (CE), a free and open-source penetration testing solution that maps attack paths in Microsoft Active Directory (AD) and Azure (including Azure... Read more »

Reducing Generative AI Hallucinations and Trusting Your Data: Interview With Cognite CPO Moe Tanabian

In a conversation with Cognite CPO Moe Tanabian, learn how industrial software can combine human and AI skills to create smarter digital twins. Read more »

UAC: Live response collection script for incident response

Unix-like Artifacts Collector (UAC) is a live response collection script for incident response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi,... Read more »

Product showcase: Stellar Toolkit for Exchange – Restore Exchange Database

Time is of the essence when it comes to recovery after Exchange Server failure or database corruption, as organizations depend on emails for their day-to-day business communication. The more... Read more »

How to Create a Custom Security & Threat Dashboard in Power BI

Want a custom security dashboard to bring together data from multiple places? Microsoft Power BI can do that and help you spot what’s changing. Read more »
Subscribe to our Newsletter