![](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/10092651/product_month_october2022_1200-400x200.jpg)
Infosec products of the month: October 2022
Here’s a look at the most interesting products from the past month, featuring releases from: ABBYY, ARMO, Array, AuditBoard, AwareGO, Code42, Corelight, Digi International, …
![](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/06113516/infosec_week-1200-07102022-400x200.jpg)
New infosec products of the week: October 7, 2022
Here’s a look at the most interesting products from the past week, featuring releases from HashiCorp, Legit Security, LiveAction, LogRhythm, Pentest People, and Verica. …
![security platform](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/20092552/security_platforma_1200-400x200.jpg)
Verica ProwlerPro SaaS strenghtens security posture for companies running software on AWS
Verica launched ProwlerPro SaaS, providing companies running software on AWS with free AWS security solution. ProwlerPro SaaS gives customers access to parallelized processing …
![Aaron Rinehart](https://img.helpnetsecurity.com/wp-content/uploads/2022/01/28153221/aaron_rinehart_2-verica-400x200.jpg)
Building confidence in your system’s security with chaos engineering
In this interview with Help Net Security, Aaron Rinehart, CTO at Verica, explains the discipline of chaos engineering and how it can help organizations build more resilient …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14111334/money_1200-400x200.jpg)
Verica raises $12 million to scale continuous verification platform
Verica announced it has raised $12M in Series A funding led by Intel Capital, with participation from True Ventures and Mango Capital. The financing brings Verica’s total …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege