Check Point unveils AI Defense Plane to govern and secure enterprise AI systems

Check Point has announced the Check Point AI Defense Plane, a unified AI security control plane designed to help enterprises govern how AI is connected, deployed, and operated across the business. As AI systems move from assistants to autonomous actors… Continue reading Check Point unveils AI Defense Plane to govern and secure enterprise AI systems

Protos AI delivers agent-driven threat intelligence without vendor lock-in

Protos Labs has announced the launch of a freemium edition of Protos AI, a platform that deploys specialized AI agents augmenting cyber threat intelligence (CTI) analyst teams by executing structured investigations from planning to reporting. The new t… Continue reading Protos AI delivers agent-driven threat intelligence without vendor lock-in

SecurityScorecard automates third-party risk management with TITAN AI

SecurityScorecard has introduced TITAN AI to automate third-party risk management, replacing manual processes with continuous, AI-driven intelligence. TITAN AI is built on top of SecurityScorecard’s Ratings and TPRM platform with AI-driven technology a… Continue reading SecurityScorecard automates third-party risk management with TITAN AI

Lumu enhances Defender to detect compromise across network, cloud, endpoint, and identity

Lumu has upgraded its Lumu Defender NDR solution, extending Continuous Compromise Assessment beyond the network to include endpoints, cloud environments, and user behavior for unified visibility. The past year marks a strategic shift in attack methods,… Continue reading Lumu enhances Defender to detect compromise across network, cloud, endpoint, and identity

Tuskira replaces centralized detection model with real-time, distributed approach

Tuskira has released its Federated Detection Engine, a new capability within its Agentic SecOps platform that enables real-time threat detection across cloud, identity, endpoint, network, SaaS, infrastructure, and legacy SIEM environments, without rely… Continue reading Tuskira replaces centralized detection model with real-time, distributed approach

Coro automates security operations with end-to-end threat detection and response

Coro has expanded AI-driven security operations capabilities that automate the full lifecycle of threat detection and response, enabling organizations to identify, investigate, and remediate security incidents without manual intervention. The announcem… Continue reading Coro automates security operations with end-to-end threat detection and response

Cisco builds security framework for safe enterprise adoption of AI agents

Cisco has introduced solutions to address AI security issues and remove a top barrier to agent adoption. By establishing trusted identities, enforcing strict zero trust Access controls, hardening agents before deployment, enforcing guardrails at runtim… Continue reading Cisco builds security framework for safe enterprise adoption of AI agents

RSA ID Plus Sovereign Deployment delivers full-stack identity for high-risk environments

RSA has unveiled RSA ID Plus Sovereign Deployment, a high-assurance identity solution built for organizations requiring continuous availability, data sovereignty, and resilience against advanced threats. RSA ID Plus Sovereign Deployment is the next evo… Continue reading RSA ID Plus Sovereign Deployment delivers full-stack identity for high-risk environments