Building GenAI competence for business growth
To embark on the GenAI technology adoption journey for business success, organizations require foundational activities related to GenAI investment, guidance in prioritizing use cases, and identification of key stakeholders essential for building and.....»»
Hidden dangers loom for subsea cables, the invisible infrastructure of the internet
More than 97% of the world’s internet traffic passes through subsea cables at some point, according to ENISA. Subsea cables are a vital component of the global internet infrastructure, and it is critical to protect them from cyberattacks, physical.....»»
NordVPN Sonar helps internet users detect phishing emails
NordVPN launched its first experimental project under the NordLabs platform. The AI-enabled browser extension Sonar aims to help internet users detect phishing emails and protect themselves from cybercrimes. “AI tools have facilitated the autom.....»»
McAfee Scam Protection blocks fake emails, texts, and social media links
McAfee launched McAfee Scam Protection to address the rise in AI-generated phishing scams. The latest feature in McAfee’s product suite draws on patented AI technology to turn the tables on cybercriminals using AI to turbocharge scams and deceive p.....»»
1Password introduces mobile support for passkeys
1Password customers can now create, manage, and sign in with passkeys on a growing number of websites and apps, providing cross-platform access on iOS 17 and Android 14, as well as all major web browsers on Mac, Windows, and Linux. Later this fall, 1.....»»
Wing Security releases SaaS protection tier for mid-market companies
Wing Security launched its new SSPM for Compliance tier, enabling midmarket companies to adopt SaaS solutions while meeting a base level of security required by compliance frameworks. Customers who are seeking a comprehensive 24×7 posture manage.....»»
Mirantis Lens AppIQ empowers developers to visualize application details
Mirantis launched Lens AppIQ, available directly to the 50,000 organizations who use Lens today directly in Lens Desktop and as (Software as a Service) SaaS. Lens AppIQ provides application intelligence – collecting information from many different.....»»
Privacera integrates with Collibra to automate data governance and policy enforcement
Privacera announced its integration with Collibra, the Data Intelligence company, which enables seamless end-to-end data security and data governance. From data cataloging and data classification to enforcement of data access policies, the integratio.....»»
Akamai partners with Corero Network Security to improve DDoS protection for enterprises
Akamai announced a global partnership with Corero Network Security, the specialists in distributed denial-of-service (DDoS) protection solutions. Akamai is now offering Corero’s on-premises DDoS protection to extend Akamai Prolexic, Akamai̵.....»»
Cybellum launches Product Security Synergy Services
Cybellum launched new Product Security Synergy Services, augmenting its platform with a broad set of expert services, covering the entire product lifecycle. Device manufacturers and their suppliers, across all safety-critical industries, including au.....»»
Legit Security raises $40 million to address AI’s threats to applications
Legit Security has successfully closed a $40 million venture capital round investment led by CRV with participation from existing investors Cyberstarts, Bessemer Venture Partners, and TCV. Legit Security’s ASPM platform continuously reduces app.....»»
Oracle Fusion Data Intelligence Platform enables users to achieve better business outcomes
Oracle announced the Fusion Data Intelligence Platform, a next-generation data, analytics, and AI platform that will help Oracle Fusion Cloud Applications customers achieve better business outcomes by combining data-driven insights with intelligent d.....»»
Egnyte collaborates with Microsoft to drive the hybrid workforce
Egnyte announced an enhanced relationship with Microsoft that provides customers with additional real-time document collaboration and sharing features through Microsoft 365 and a Microsoft Teams integration that makes it easy for customers to share a.....»»
Red Hat and Intel deliver open source industrial automation to the manufacturing shop floor
Red Hat announced a new industrial edge platform, designed in collaboration with Intel, that will provide a modern approach to building and operating industrial controls. By transforming the way manufacturers operate, scale and innovate with standard.....»»
NETGEAR Orbi 970 Series enhances home connectivity
NETGEAR has introduced the Orbi 970 Series, leveraging innovative antenna design and patented technology to optimize WiFi 7 performance. The Orbi 970 Series delivers speeds of up to 27 Gbps, a slim, elegant design and high-performance antennas for 36.....»»
VectorZero Active Data Vault 2.0 secures sensitive data
VectorZero announced the newest release of its Active Data Vault, version 2.0, which introduces new cybersecurity features. This highly secure and isolated environment is designed for storage plus secure and easy use of extremely sensitive data. Acti.....»»
Rising OT/ICS cybersecurity incidents reveal alarming trend
60% of cyberattacks against the industrial sector are led by state-affiliated actors and often unintentionally enabled by internal personnel (about 33% of the time), according to Rockwell Automation. This corroborates other industry research showing.....»»
18 free Microsoft Azure cybersecurity resources you should check out
Far exceeding a traditional public cloud platform, Azure is a comprehensive suite of over 200 products and cloud services engineered to solve current challenges and pave the way for the future. Whether you’re looking to build, run, or manage ap.....»»
What AppSec and developers working in cloud-native environments need to know
All enterprise organizations are, in essence, software publishers, regardless of their industry. This is because every enterprise relies on custom software applications for managing internal processes, interacting with customers, or analyzing data, m.....»»
Shadow IT: Security policies may be a problem
3 out of 4 workers use personal (and often unmanaged) phones and laptops for work and nearly half of companies let unmanaged devices access protected resources, a recent report by Kolide and Dimensional Research has revealed. When asked why they use.....»»