Please turn on your JavaScript for this page to function normally.
ZeroFox’s external threat hunting capabilities give analysts complete access to raw threat intelligence

ZeroFox released an advanced external threat hunting capabilities within the ZeroFox platform, designed to provide real-time threat intelligence to threat hunters, analysts …

TrapX DeceptionGrid 7.2 protects containers against cryptojacking and other malicious attacks

TrapX Security launched TrapX DeceptionGrid 7.2 featuring a new capability to protect containerized environments such as Kubernetes. TrapX DeceptionGrid secures container …

Threat Stack provides full-stack observability into Amazon EKS on AWS Fargate

Threat Stack announced it has expanded its AWS Fargate Security Monitoring to include Amazon Elastic Kubernetes Service (Amazon EKS). Using the Threat Stack Cloud Security …

Entrust nShield HSMs brings cryptographic services to VMware Tanzu Kubernetes Grid

Entrust announced certification of its nShield hardware security modules (HSMs) with VMware Tanzu Kubernetes Grid. Entrust nShield HSMs provide robust cryptographic services, …

Inmarsat ORCHESTRA integrates GEO, LEO and terrestrial 5G into one solution

Inmarsat unveiled plans for ORCHESTRA, the communications network of the future. In the largest ever transformation of its current services, Inmarsat ORCHESTRA will bring …

Bosch enhances Praesensa portfolio with new ambient noise sensor

When Praesensa was launched at the end of 2019, Bosch set a new standard for quality, security and reliability in public address and voice alarm (PA/VA) systems. The latest …

D-Link EAGLE PRO AI series optimizes the performance of home networks

D-Link Corporation announced their latest EAGLE PRO AI product series at the D-Link Product Launch Conference. D-Link President Mark Chen began by discussing the impacts of …

DVL services from Windstream Enterprise modernize existing telephony environment

Windstream Enterprise launched a new IP-based solution tailored to the need for critical safety voice applications. Digital Voice Lines (DVL) with Cellular Failover from …

Extreme Networks AP4000 platform delivers Wi-Fi 6E technology for high-density environments

Extreme Networks announced a new Wi-Fi 6E access point: the Extreme AP4000 universal wireless platform, capable of operating in the 6 GHz frequency spectrum. Designed for …

UfiSpace releases S9600 series open aggregation routers for broadband and mobile operator networks

UfiSpace launched its S9600 series open aggregation routers based on Broadcom‘s Qumran2c silicon. Their open aggregation routers include three models of varying port …

CIS Secure expands portfolio of TSG devices with Poly 8300 conference phone

CIS Secure received approval from the National Telecommunications Security Working Group (NTSWG) for its new Poly 8300 TSG conference phone. The Poly 8300 conference phone is …

Deloitte collaborates with Palo Alto Networks to offer zero trust and multi-cloud cybersecurity solutions

Deloitte has formed a strategic alliance with Palo Alto Networks to deliver integrated, end-to-end zero trust and multi-cloud cybersecurity solutions to their mutual …

Don't miss

Cybersecurity news