Industry News
LOKKER Consent Verification identifies potential compliance issues
LOKKER released Consent Verification, a new tool in LOKKER’s Privacy Edge Platform that gives businesses a simple way to check whether their consent banners are properly …
Veeam Data Cloud Vault enables users to securely store backup data
Veeam Software introduced Veeam Data Cloud Vault, a cloud-based storage service that enables users to securely store backup data not only off-site, but in an always-immutable …
ManageEngine unveils passwordless, phishing-resistant FIDO2 authentication
ManageEngine launched passwordless, phishing-resistant FIDO2 authentication for enterprise applications in ADSelfService Plus, its on-premises identity security solution, and …
SailPoint Risk Connectors helps organizations identify and act on risks
SailPoint has announced a new offering on its Atlas platform, SailPoint Risk Connectors. As part of its Atlas platform, SailPoint Risk Connectors makes it easier for …
Wipro Cyber X-Ray empowers CXOs to make optimized security investment decisions
Wipro Wipro has partnered with Zscaler to introduce Wipro Cyber X-Ray, an AI-assisted decision support platform. Wipro Cyber X-Ray empowers enterprise CXOs to make optimized …
Trend Micro Inline NDR enhances threat detection and response
Trend Micro announced its latest breakthrough in network detection and response (NDR) technology: Inline NDR. The technology is available via the Trend Vision One platform, …
Zyxel Networks USG LITE 60AX improves network security
Zyxel Networks launched the USG LITE 60AX–an AX6000 WiFi 6 Security Router designed for small businesses, teleworkers, and managed service providers (MSPs). In today’s …
apexanalytix Cyber Risk provides instant alerts for supplier data breaches
apexanalytix launched Cyber Risk, a solution that automatically assesses the cybersecurity posture of every supplier, continuously monitors the dark web to uncover risk …
Truecaller AI Call Scanner detects AI voice clones in real-time
Three seconds! That’s how much of your voice an AI voice synthesizer needs to generate a complete clone of your voice. Illegitimate voice cloning and speech synthesis …
GMO GlobalSign introduces Certificate Automation Manager
GMO GlobalSign announced the rebranding of the company’s certificate automation product, Automated Enrollment Gateway (AEG), to Certificate Automation Manager. The renamed …
Dashlane Nudges reduces the risk of credential theft
Dashlane unveiled Dashlane Nudges, a new automated tool to empower admins to proactively create a more security-conscious workforce and drive better credential security …
Transcend raises $40 million to address data privacy issues
Transcend raised $40 million in Series B funding led by new investor StepStone Group, with participation from HighlandX and existing investors Accel, Index Ventures, 01 …
Featured news
Resources
Don't miss
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims
- A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
- Why your security strategy is failing before it even starts
- Protecting mobile privacy in real time with predictive adversarial defense
- Los Alamos researchers warn AI may upend national security