Cybellum launched new Product Security Synergy Services, augmenting its platform with a broad set of expert services, covering the entire product lifecycle. Device manufacturers and their suppliers, across all safety-critical industries, including automotive, medical, and industrial equipment, are facing increased…
Category: Help Net Security
Legit Security raises $40 million to address AI’s threats to applications
Legit Security has successfully closed a $40 million venture capital round investment led by CRV with participation from existing investors Cyberstarts, Bessemer Venture Partners, and TCV. Legit Security’s ASPM platform continuously reduces application risk through discovery, analysis, correlation, and remediation…
Oracle Fusion Data Intelligence Platform enables users to achieve better business outcomes
Oracle announced the Fusion Data Intelligence Platform, a next-generation data, analytics, and AI platform that will help Oracle Fusion Cloud Applications customers achieve better business outcomes by combining data-driven insights with intelligent decisions and actions. This new platform, an evolution…
Mirantis Lens AppIQ empowers developers to visualize application details
Mirantis launched Lens AppIQ, available directly to the 50,000 organizations who use Lens today directly in Lens Desktop and as (Software as a Service) SaaS. Lens AppIQ provides application intelligence – collecting information from many different configuration files and sources…
Privacera integrates with Collibra to automate data governance and policy enforcement
Privacera announced its integration with Collibra, the Data Intelligence company, which enables seamless end-to-end data security and data governance. From data cataloging and data classification to enforcement of data access policies, the integration automates data governance and streamlines compliance and…
NETGEAR Orbi 970 Series enhances home connectivity
NETGEAR has introduced the Orbi 970 Series, leveraging innovative antenna design and patented technology to optimize WiFi 7 performance. The Orbi 970 Series delivers speeds of up to 27 Gbps, a slim, elegant design and high-performance antennas for 360-degree coverage…
VectorZero Active Data Vault 2.0 secures sensitive data
VectorZero announced the newest release of its Active Data Vault, version 2.0, which introduces new cybersecurity features. This highly secure and isolated environment is designed for storage plus secure and easy use of extremely sensitive data. Active Data Vault 2.0…
Egnyte collaborates with Microsoft to drive the hybrid workforce
Egnyte announced an enhanced relationship with Microsoft that provides customers with additional real-time document collaboration and sharing features through Microsoft 365 and a Microsoft Teams integration that makes it easy for customers to share and upload files directly within Teams…
Red Hat and Intel deliver open source industrial automation to the manufacturing shop floor
Red Hat announced a new industrial edge platform, designed in collaboration with Intel, that will provide a modern approach to building and operating industrial controls. By transforming the way manufacturers operate, scale and innovate with standard IT technologies delivered to…
Rising OT/ICS cybersecurity incidents reveal alarming trend
60% of cyberattacks against the industrial sector are led by state-affiliated actors and often unintentionally enabled by internal personnel (about 33% of the time), according to Rockwell Automation. This corroborates other industry research showing OT/ICS (Industrial Control Systems) cybersecurity incidents…
18 free Microsoft Azure cybersecurity resources you should check out
Far exceeding a traditional public cloud platform, Azure is a comprehensive suite of over 200 products and cloud services engineered to solve current challenges and pave the way for the future. Whether you’re looking to build, run, or manage applications,…
What AppSec and developers working in cloud-native environments need to know
All enterprise organizations are, in essence, software publishers, regardless of their industry. This is because every enterprise relies on custom software applications for managing internal processes, interacting with customers, or analyzing data, making them creators and distributors of software to…
Shadow IT: Security policies may be a problem
3 out of 4 workers use personal (and often unmanaged) phones and laptops for work and nearly half of companies let unmanaged devices access protected resources, a recent report by Kolide and Dimensional Research has revealed. When asked why they…
Strong compliance management is crucial for fintech-bank partnerships
72% of banks and credit unions are prioritizing compliance when evaluating fintechs, citing it as their top criteria in the due diligence process, according to Ncontracts. As banks and credit unions evaluate fintech partnerships, cybersecurity (62%) is also a critical…
Security concerns and outages elevate observability from IT niche to business essential
Enterprises that leverage observability increase operational efficiency and grow revenue, according to SolarWinds. The report explores how enterprises can act proactively to maximise the advantages of their observability solutions, integrate best practices into implementations, and mitigate common adoption challenges. The…
Deepwatch platform enhancements improve cyber resiliency for businesses
Deepwatch announced new enhancements to the Deepwatch Managed Security Platform that improve the ability for companies to anticipate, respond, recover, and withstand future cyber threats while continuously improving business resiliency. The new platform enhancements are designed to move Deepwatch and…
Ping Identity introduces passwordless solution for better customer experiences
Ping Identity released PingOne for Customers Passwordless, a cloud solution that helps enterprises accelerate their passwordless initiatives and make the digital experiences for customers more convenient and seamless. PingOne for Customers Passwordless allows administrators to design, test, and deploy secure…
Entrust’s zero trust solutions enhance security of applications, encryption keys and secrets
Entrust announced new capabilities to help organizations enhance their security posture and advance their zero trust maturity journey. The new features extend protections, visibility, and governance over virtual infrastructures, code and application development, and cryptographic key management. “IT and security…
Open Systems OT Firewall monitors traffic and detects threats
Open Systems introduced OT firewall service to secure critical infrastructures. The Open Systems OT Firewall provides organizations with a dedicated appliance at the center of operational technology (OT) networks for better visibility and control of Industrial Internet of Things (IIoT)…
OneTrust helps organizations manage the complexity of their trust programs
OneTrust unveiled innovations to help organizations manage the complexity of their trust programs, better understand their data to activate and use it, be more resilient against emerging threats, and unlock productivity when navigating compliance. These innovations include new capabilities across…