Industry News

N2WS launches cross-cloud volume restore for AWS and Azure
N2WS has introduced several new features to its cloud-native backup and disaster recovery (BDR) platform to help enterprises and managed service providers (MSPs) with …

LOKKER Consent Verification identifies potential compliance issues
LOKKER released Consent Verification, a new tool in LOKKER’s Privacy Edge Platform that gives businesses a simple way to check whether their consent banners are properly …

Veeam Data Cloud Vault enables users to securely store backup data
Veeam Software introduced Veeam Data Cloud Vault, a cloud-based storage service that enables users to securely store backup data not only off-site, but in an always-immutable …

ManageEngine unveils passwordless, phishing-resistant FIDO2 authentication
ManageEngine launched passwordless, phishing-resistant FIDO2 authentication for enterprise applications in ADSelfService Plus, its on-premises identity security solution, and …

SailPoint Risk Connectors helps organizations identify and act on risks
SailPoint has announced a new offering on its Atlas platform, SailPoint Risk Connectors. As part of its Atlas platform, SailPoint Risk Connectors makes it easier for …

Wipro Cyber X-Ray empowers CXOs to make optimized security investment decisions
Wipro Wipro has partnered with Zscaler to introduce Wipro Cyber X-Ray, an AI-assisted decision support platform. Wipro Cyber X-Ray empowers enterprise CXOs to make optimized …

Trend Micro Inline NDR enhances threat detection and response
Trend Micro announced its latest breakthrough in network detection and response (NDR) technology: Inline NDR. The technology is available via the Trend Vision One platform, …

Zyxel Networks USG LITE 60AX improves network security
Zyxel Networks launched the USG LITE 60AX–an AX6000 WiFi 6 Security Router designed for small businesses, teleworkers, and managed service providers (MSPs). In today’s …

apexanalytix Cyber Risk provides instant alerts for supplier data breaches
apexanalytix launched Cyber Risk, a solution that automatically assesses the cybersecurity posture of every supplier, continuously monitors the dark web to uncover risk …

Truecaller AI Call Scanner detects AI voice clones in real-time
Three seconds! That’s how much of your voice an AI voice synthesizer needs to generate a complete clone of your voice. Illegitimate voice cloning and speech synthesis …

GMO GlobalSign introduces Certificate Automation Manager
GMO GlobalSign announced the rebranding of the company’s certificate automation product, Automated Enrollment Gateway (AEG), to Certificate Automation Manager. The renamed …

Dashlane Nudges reduces the risk of credential theft
Dashlane unveiled Dashlane Nudges, a new automated tool to empower admins to proactively create a more security-conscious workforce and drive better credential security …
Featured news
Resources
Don't miss
- Agentic AI coding assistant helped attacker breach, extort 17 distinct organizations
- ScamAgent shows how AI could power the next wave of scam calls
- Where security, DevOps, and data science finally meet on AI strategy
- Can AI make threat intelligence easier? One platform thinks so
- Hundreds of Salesforce customer orgs hit in clever attack with potentially huge blast radius