Keytos EZSmartCard enables organizations to go passwordless
Keytos launched EZSmartCard at the Black Hat USA 2022 conference, helping organizations to meet the strict identity requirements of the US Government Executive Order 14028 by enabling passwordless onboarding and creation of cryptographic smartcards......»»
Nokod Security Platform secures low-code/no-code development environments and apps
Nokod Security launched the Nokod Security Platform, enabling organizations to protect against security threats, vulnerabilities, compliance issues, and misconfigurations introduced by LCNC applications and robotic process automations (RPAs). Most or.....»»
97% of security leaders have increased SaaS security budgets
58% of the organizations were affected by a SaaS security incident in the last 18 months, according to Valence Security’s 2024 State of SaaS Security Report. Likely, as a result, 96% security leaders have made SaaS security a top priority and 97% h.....»»
Most companies changed their cybersecurity strategy in the past year
Businesses worldwide have faced a rate of change in the threat environment evidenced by 95% of companies reporting cybersecurity strategy adjustments within just the past year, according to LogRhythm. Strategic shifts within organizations At the hear.....»»
Ransom recovery costs reach $2.73 million
Average ransom payment has increased 500% in the last year, according to Sophos. Organizations that paid the ransom reported an average payment of $2 million, up from $400,000 in 2023. However, ransoms are just one part of the cost. Excluding ransoms.....»»
Gurucul REVEAL empowers organizations with full control over data
Gurucul announced REVEAL, a unified security analytics platform. REVEAL delivers Threat Detection, Investigation and Response (TDIR) regardless of data type, volume and residency through a combination of its AI/ML analytics, an intelligent data engin.....»»
1Password Extended Access Management secures unmanaged applications and devices
1Password launched 1Password Extended Access Management, a new solution that enables businesses to secure every sign-in to every application from every device. This launch further extends 1Password’s multi-product offering into zero trust, establis.....»»
Secure Code Warrior SCW Trust Score quantifies the security posture of developer teams
Secure Code Warrior unveiled SCW Trust Score, a benchmark that quantifies the security posture of organizations’ developer teams. SCW Trust Score provides a vital baseline of the impact of their learning programs, assesses its effectiveness, and en.....»»
Veracode platform enhancements help organizations reduce application risk
Veracode announced platform innovations that set a new standard for developer-powered application security. New repo risk visibility and analysis from Longbow Security, powered by Veracode, speeds up remediation of application risk from code reposito.....»»
Lineaje OSM improves software supply chain security
Lineaje unveiled Open-Source Manager (OSM), which brings transparency to open-source software components in applications and proactively manages and mitigates associated risks. Lineaje’s OSM enables full lifecycle governance of open-source software.....»»
Venafi launches 90-Day TLS Readiness Solution
Venafi launched its new 90-Day TLS Readiness Solution to help organizations comply with Google’s proposed 90-day TLS certificate standard, improving security posture while reducing the risk of certificate-related interruptions. According to a V.....»»
Skyhawk Security unveils cloud-native CTEM, streamlining security with AI-powered automation
Skyhawk Security has unveiled its cloud native Continuous Threat Exposure Management (CTEM) solution. The agentless approach empowers organizations to automate their CTEM program for the first time and operationalize it through Skyhawk’s existing A.....»»
Essential steps for zero-trust strategy implementation
63% of organizations worldwide have fully or partially implemented a zero-trust strategy, according to Gartner. For 78% of organizations implementing a zero-trust strategy, this investment represents less than 25% of the overall cybersecurity budget......»»
EU probes Meta for killing tool that enables real-time election monitoring
EU probes Facebook/Instagram owner for possible Digital Services Act violations. Enlarge (credit: Getty Images | Chesnot ) The European Commission today accused Meta of violating rules related to deceptive advertising, p.....»»
Cybersixgill Third-Party Intelligence module identifies potential supply chain risks
Cybersixgill, the global cyber threat intelligence data provider, broke new ground by introducing its Third-Party Intelligence module. The new module delivers vendor-specific cybersecurity and threat intelligence to organizations’ security team.....»»
eBook: Do you have what it takes to lead in cybersecurity?
Organizations worldwide need talented, experienced, and knowledgeable cybersecurity teams who understand the advantages and risks of emerging technologies. Aspiring leaders in the cybersecurity field need more than just job experience. They need a di.....»»
CyberQP unveils solutions to help MSPs proactively prevent security incidents
CyberQP announced QGuard Pro, a solution with enhanced capabilities designed to exponentially increase technician efficiency, and a new API for Deployment are now generally available. QGuard Pro comes with Passwordless MFA for Technicians, which augm.....»»
Closing the cybersecurity skills gap with upskilling programs
The list of skills technologists and organizations need to succeed grows with each new tech advancement, according to Pluralsight. But for many organizations, budgets and staff continue to shrink. This survey asked 1,400 executives and IT professiona.....»»
Optical barcodes expand range of high-resolution sensor
The same geometric quirk that lets visitors murmur messages around the circular dome of the whispering gallery at St. Paul's Cathedral in London or across St. Louis Union Station's whispering arch also enables the construction of high-resolution opti.....»»
What AI can tell organizations about their M&A risk
Following the past few years of economic turbulence, merger and acquisition (M&A) activity is on the rise in 2024, with several acquisition deals being announced in the first few months of the year valued at billions of dollars. With the surge of AI.....»»
How to Use Apple Managed Device Attestation to secure networks
Managed Device Attestation enables enterprises to verify Apple devices for security, protecting the corporate network. Here's how to use it.Apple Device Attestation.In our interconnected world, the issue of device identity plays a critical role in on.....»»