Obsidian Security

Obsidian Security’s session hijacking feature prevents attackers from stealing tokens
Obsidian Security unveiled the ability to detect SaaS session hijacking attempts early in the kill chain across multiple platforms like Okta, Azure AD, Microsoft 365 and more. …
Obsidian SaaS security solution now available on AWS Marketplace
Obsidian announced availability in Amazon Web Services (AWS) Marketplace. AWS customers can now purchase the Obsidian SaaS security solution directly in AWS Marketplace and …

New infosec products of the week: May 1, 2020
Guardicore Infection Monkey now maps its actions to MITRE ATT&CK knowledge base The latest version of Guardicore Infection Monkey now maps its actions to the MITRE …

Obsidian Security lets security teams monitor Zoom usage
Obsidian Security announced protection for Zoom, enabling organizations to safely embrace the leading video communications service as a business-critical application. Using …

RSA Conference announces finalists for Innovation Sandbox Contest 2020
RSA Conference announced the 10 finalists for its Innovation Sandbox Contest 2020. The competition calls on the most promising young companies in cybersecurity to showcase …

Security capabilities are lagging behind cloud adoption
Security professionals regard their existing tools inadequate for securing critical cloud data, even as their organizations invest heavily, with increasing speed, in cloud …
Obsidian Security appoints Laura Norén as Vice President of Privacy and Trust
Obsidian Security, a cybersecurity company providing intelligent identity protection for hybrid enterprises, announced the appointment of Laura Norén as Vice President of …

Cybersecurity and ethical data management: Getting it right
Data can provide information, information can lead to insight and knowledge, and knowledge is power. It’s no wonder, then, that seemingly everybody in this modern, …
Featured news
Resources
Don't miss
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices