Please turn on your JavaScript for this page to function normally.
Mitek acquires ID R&D to provide protection against identity theft and dangerous fraud techniques

Mitek announced that it has acquired ID R&D, a provider of artificial intelligence (AI)-based voice and face biometrics and liveness detection. Shareholders of ID R&D …

network
Cybersecurity industry analysis: Another recurring vulnerability we must correct

I have spent my career finding, fixing, discussing, and breaking down software vulnerabilities, one way or another. I know that when it comes to some common security bugs, …

Protegrity now available in AWS Marketplace

Protegrity announced the availability of three Protegrity products in AWS Marketplace: Protegrity Discover, Cloud Protect for Amazon Redshift, and Cloud Protect for Snowflake. …

AtScale CloudStart builds analytics infrastructure on cloud data platforms

AtScale announced the launch of AtScale CloudStart for building powerful analytics infrastructure on cloud data platforms. This offering enables organizations to rapidly …

Blue Hexagon delivers agentless cloud-native AI security at runtime for Google Cloud

Blue Hexagon offers agentless cloud-native AI security at runtime for Google Cloud. “With the rise of cloud-based Infrastructure as a Service (IaaS) and Platform as a Service …

IntSights enhances its platform to expand investigation capabilities and threat library

IntSights announced enhancements to the company’s External Threat Protection Suite, offering customers a brand new experience and functionality to its TIP module that …

DataDome raises $35M to scale its global sales, marketing, delivery and R&D teams

DataDome announced that it has secured a $35M Series B investment. The funding round was led by New York-based Elephant, with participation from DataDome’s existing investor …

Yor
Open-source tool Yor automatically tags IaC resources for traceability and auditability

Yor is an open-source tool from Palo Alto Networks that automatically tags cloud resources within infrastructure as code (IaC) frameworks such as Terraform, Cloudformation, …

SASE
Adding complexity through simplification: Breaking down SASE

In an industry that’s not short of jargon and buzzwords, cybersecurity has a new acronym to reckon with: SASE, or secure access service edge. Introduced by Gartner in 2019 and …

1Kosmos Passwordless Identity Package provides a scalable passwordless authentication solution

1Kosmos announced the availability of its Passwordless Identity Package (PIP). The 1Kosmos PIP provides enterprises a risk-free, scalable passwordless authentication solution. …

Adaptiva adds new capabilities and health checks to its Endpoint Health product

Adaptiva announced the release of a new version of Endpoint Health, the fastest, most scalable solution to assess and remediate endpoint health. With this launch, Adaptiva not …

user
Four proactive steps to make identity governance a business priority

Securing digital identities is crucial to business success today, but far too often, it’s an afterthought. As such, identity governance shouldn’t be celebrated as a singular …

Don't miss

Cybersecurity news