Please turn on your JavaScript for this page to function normally.
Wallarm
Wallarm advances API security with native gRPC and GraphQL support

At RSA Conference 2020, Wallarm released an expanded set of parsers, detection of API-specific vulnerabilities and API schema analysis for gRPC and GraphQL. With Wallarm …

RSA Conference 2020
10 hot industry newcomers to watch at RSA Conference 2020

The RSA Conference 2020 Early Stage Expo is an innovation space dedicated to promoting emerging talent in the industry. Here are some of the most exciting companies exhibiting …

Unisys Stealth
Unisys offers $10,000 to those who compromise a target system protected by Stealth

Unisys announced that the company is offering $10,000 to participants who can capture data and credentials protected by the Unisys Stealth cybersecurity solution at RSA …

Cyware Labs
Cyware’s 2.0 suite of cyber fusion products enables orgs to detect, analyze, and act on security threats

Cyware Labs, provider of advanced cyber fusion solutions, announced the release of version 2.0 of the company’s product suite. Available now, enhancements across the matrix of …

vote
ElectionShield protects political campaigns from online threats

ElectionShield utilizes BrandShield’s technology to protect political campaigns and candidates from a growing range of online threats. These include social impersonation; …

CyberX
CyberX integrates with Microsoft Azure Security Center

CyberX announced a new API-level integration with Microsoft Azure Security Center for IoT, enabling joint clients to gain a unified view of security across all their managed …

Zero Networks
Zero Networks Access Orchestrator: Autonomous, airtight network access security at scale

Zero Networks unveiled the Zero Networks Access Orchestrator, the first network security platform that automatically defines, enforces and adapts user- and machine-level …

ProcessUnity
ProcessUnity Vendor Risk Management expanded to include new best practices configuration

ProcessUnity, a leading provider of cloud-based applications for risk and compliance management, today announced a new pre-built configuration of its award-winning Vendor Risk …

cloud
Cloud misconfigurations surge, organizations need continuous controls

Nearly 33.4 billion records were exposed in breaches due to cloud misconfigurations in 2018 and 2019, amounting to nearly $5 trillion in costs to enterprises globally, …

Cymatic architecture
Cymatic presents all-in-one web application defense platform at RSAC 2020

Cymatic announced its participation in RSAC 2020 to demonstrate the success of the only unified web defense that deploys at the client through a simple line of JavaScript …

BluBracket
BluBracket unveils security solution that makes code safe

BluBracket, the leader in securing code for the enterprise, introduced its product suite, representing the industry’s first comprehensive security solution for code in the …

LUMU dashboard
Is your network already compromised? LUMU illuminates network blind spots

LUMU has come out of stealth mode and for the first time will be publicly showcasing its solution at this year’s RSA Conference. LUMU was founded in 2019 by cybersecurity …

Don't miss

Cybersecurity news