Please turn on your JavaScript for this page to function normally.
Whitebox Designer from Inside Secure protects cryptographic keys and operations

Inside Secure announced general availability of Whitebox Designer, its new software security tool that arms vehicle app developers, IoT device developers and OEMs with new …

Cequence Security detects and defends against attacks that exploit application vulnerabilities

Cequence Security, a provider of innovative application security solutions for today’s hyper-connected enterprises, announced it has expanded the capabilities of its …

Optiv launches new cloud threat monitoring and compliance as-a-service offering

Cloud services provide the speed and agility necessary for enterprises to transform business. However, the dynamic and intangible nature of cloud is challenging businesses to …

New Onapsis service assesses SAP applications to identify critical risks

Onapsis, the leader in business-application cyber resilience, announced the industry’s first Business Risk Illustration assessment for business-critical applications. …

A zero trust framework designed for the enterprise

Ping Identity announced its capabilities framework and practical guidance for adopting a Zero Trust security strategy. This framework provides reliable direction to companies …

Zingbox IoT Command Center addresses security, management and optimization

Zingbox, the provider of the most widely deployed Internet of Things (IoT) lifecycle management solution, announced the availability of Zingbox IoT Command Center. Powered by …

Jazz Networks policy engine enables automated workforce cybersecurity training

Jazz Networks, an award-winning cybersecurity platform, announces that its newest release makes it the first of its kind to enable fully-customizable insider threat detection …

Synack introduces secure and managed workspaces with endpoint control

Synack, the most trusted crowdsourced security testing platform and top choice of major enterprises and governments, becomes the only crowdsourced penetration testing company …

Imperva acquires Distil Networks

Imperva has signed an agreement to acquire Distil Networks. The acquisition reinforces Imperva’s market leadership in the application security market and furthers the …

Wandera Secure Access Layer preserves privacy for the end user while protecting mobile devices

Wandera, the leading mobile security company, announces new privacy functionality that further extends its endpoint solution to the network. The new Secure Access Layer …

CityWRX addresses ransomware with end to end virtualization and CloudWRX

On the heels of the formal launch of CloudWRX, an end-to-end cloud computing management platform, IOXO announced CityWRX, an initiative leveraging CloudWRX to provide …

iKeyVault mitigates password fatigue with Bring Your Own Authentication

iKeyVault, a technology startup in the Cybersecurity User Authentication Space, came out of stealth mode and announced the launch of its first product in BETA. iKeyVault …

Don't miss

Cybersecurity news