Category: EN

Coro SAT module defends against phishing attacks

Coro unveiled its Security Awareness Training (SAT) module. A purpose-built solution, SAT helps SMBs reduce human error, defend against phishing attacks, and demonstrate compliance without adding new tools to manage. As part of Coro’s modular cybersecurity platform, the new Security…

Review: AI Agents in Action

If you’re trying to make sense of how to actually build AI agents, not just talk about them, AI Agents in Action might be for you. About the author Michael Lanham, Lead AI Developer at Brilliant Harvest, is a seasoned…

New infosec products of the week: May 9, 2025

Here’s a look at the most interesting products from the past week, featuring releases from ProcessUnity, Searchlight Cyber, ServiceNow, and Verosint. ServiceNow unveils AI agents to accelerate enterprise self-defense The new AI agents, available within ServiceNow’s Security and Risk solutions,…

Ensuring Certainty in NHIs’ Lifecycle Management

What Makes Effective NHIs and Secrets Lifecycle Management So Crucial? The importance of NHIs and Secrets Lifecycle Management in ensuring robust cybersecurity measures is becoming increasingly apparent. Why? It offers certainty and control over automated systems within our ever-growing internet…

Being Proactive with Your NHIDR Strategy

What Does A Proactive NHIDR Strategy Look Like? A proactive Non-Human Identity and Data Rights (NHIDR) strategy involves anticipating potential threats and challenges instead of waiting for them to occur. It covers facets like security, data privacy, risk management, and…

Unlock Capabilities with Advanced NHIs Management

Are You Fully Utilizing Advanced NHIs for Secure Management? Emerging from the cornerstones of technology and cybersecurity, Non-Human Identities Management (NHIs) is proving to be a game-changer. This advanced security framework centers around safeguarding the machine identities used – the…

The dual challenge: Security and compliance

Security leaders must address both internal and external risks, ranging from sophisticated cyberattacks to insider threats. At the same time, they must also adhere to an ever-growing list of regulations, including the General Data Protection Regulation (GDPR), the EU Cyber…