Please turn on your JavaScript for this page to function normally.
Infosec products of the month: February 2022

Here’s a look at the most interesting products from the last month, featuring releases from: Arista Networks, Blueshift Cybersecurity, Bugcrowd, Cato Networks, Cofense, …

New infosec products of the week: February 11, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Cofense, Cybellum, DataStax, Federal Reserve, Gigamon, Qualys, Runecast, and Spin …

security platform
Cofense Validator identifies overlaps in email security controls

Cofense announced Cofense Validator, a solution designed to empower organizations to independently understand the effectiveness of their secure email gateways (SEGs) by …

Cofense appoints Ronnie Tokazowski as Principal Threat Advisor

Cofense has appointed Ronnie Tokazowski as Principal Threat Advisor. Tokazowski brings to the Cofense team a wealth of firsthand knowledge and research on Business Email …

Armor names Christine Gassman as Director of Global Channel Engagement

Armor is strengthening its team with the addition of Christine Gassman as director of global channel engagement. The industry veteran has an extensive history in the IT …

infosec products of the week
New infosec products of the week: July 23, 2021

Stellar Cyber XDR Kill Chain allows security analyst teams to disrupt cyberattacks Stellar Cyber introduced a realistic XDR Kill Chain to serve as a new model, addressing the …

Cofense Protect MSP: Phishing protection for MSPs safeguarding SMBs

Cofense launched Cofense Protect MSP, a phishing protection solution that’s designed for managed services providers (MSPs) tasked with protecting small and medium businesses …

Cofense acquires Cyberfish to eliminate the need for legacy email security solutions

Cofense announced the acquisition of Cyberfish, provider of next-generation phishing protection powered by Computer Vision and advanced Machine Learning (ML) technology. By …

Office 365
Phishers are trying to bypass Office 365 MFA via rogue apps

Phishers are trying to bypass the multi-factor authentication (MFA) protection on users’ Office 365 accounts by tricking them into granting permissions to a rogue …

email
What will phishers do once push-based MFA becomes widely used?

As phishing continues to be the number one method for initiating a breach, investing in anti-phishing technologies or training – preferably both – should be a …

Black Hat USA 2018
Photo gallery: Black Hat USA 2018, part 2

Black Hat USA 2018 is underway at Las Vegas. Here are a few photos from the Business Hall. Featured companies: LogRhythm, Carbon Black, Swimlane, Qualys, Cofense, Vectra, …

Network
New infosec products of the week​: June 8, 2018

Symantec launches new features for the modern workforce Symantec announced new innovations and enhancements to its Network Security for the Cloud Generation solution, designed …

Don't miss

Cybersecurity news