Please turn on your JavaScript for this page to function normally.
Neustar Inbound Authentication Pro: A single solution to verify the call and caller

Neustar, a global information services company and leader in identity resolution, has introduced a new product offering, Inbound Authentication Pro, the industry’s first …

Clearwater provides customers with guidance and purpose-built software to protect patient data

Clearwater announced The Clear Advantage Program for Business Associates, a special offering from the healthcare cybersecurity solutions provider, enabling its customers to …

Wipro launches advanced cloud SOC services using Microsoft Azure Sentinel

Wipro Limited, a leading global information technology, consulting and business process services company, announced the launch of advanced cloud Security Operations Centre …

Polte Location API now available on AWS

Polte Corporation, a leading innovator of Cloud Location over Cellular (C-LoC) technology, announced the Polte Location API is now available in the Amazon Web Services (AWS) …

FireEye’s cloud security capabilities now available on AWS

FireEye, the intelligence-led security company, announced the availability of several new cloud security capabilities on Amazon Web Services (AWS). “Threats in the cloud are …

Spirent integrates its CyberFlood Data Breach Assessment solution with the Fortinet Security Fabric

Spirent Communications, the trusted provider of test, measurement, assurance and analytics solutions for next-generation devices and networks, announced that it has integrated …

OPTOLANE chooses Trustonic for medical device security

Device and application security leader Trustonic announces that OPTOLANE has selected Trustonic Secured Platform (TSP) to bring security and trust to the company’s new …

RSA Conference 2020 unveils keynote line-up with world-class experts

RSA Conference today announced its initial line-up of keynote speakers for RSA Conference 2020, taking place at the Moscone Center in San Francisco from Monday, February 24 …

Control access and permissions to AWS services and resources

AWS IAM Access Analyzer is a new feature that makes it simple for security teams and administrators to check that their policies provide only the intended access to resources. …

Elastic Stack 7.5.0 enhances enterprise search, observability, and security

Elastic, creators of Elasticsearch, released Elastic Stack 7.5.0, the latest version of the all-in-one datastore, search engine, and analytics platform. Along with the …

Canon Medical unveils Gateway Platinum, a multi-level cybersecurity solution

With more than 470,000 patient records exposed or stolen in January of 2018 alone, cyberattacks, viruses and other malicious threats are a growing challenge for healthcare …

NRI Secure launches IT security assessment service for systems with container orchestration

NRI SecureTechnologies launched Japan’s first IT security assessment service for systems with container orchestration, that uses the leading container orchestration tool …

Don't miss

Cybersecurity news