AppGate delivers identity-based ZTNA for secure access across OT systems

AppGate has announced the launch of its Operational Technology (OT) ZTNA solution. Designed to secure industrial control systems, manufacturing plants, energy facilities, and other critical infrastructure, the offering extends AppGate’s direct-routed Z… Continue reading AppGate delivers identity-based ZTNA for secure access across OT systems

ESET introduces Cloud Workload Protection, bringing XDR visibility to cloud environments

ESET has launched ESET Cloud Workload Protection as part of a comprehensive update for its ESET PROTECT Platform. The new module extends security beyond endpoints and servers to cover cloud workloads, enriching telemetry for detection and response whil… Continue reading ESET introduces Cloud Workload Protection, bringing XDR visibility to cloud environments

Proofpoint unifies email, data, and AI security to reduce enterprise blind spots

Proofpoint has unveiled innovations across its Collaboration Security and Data Security portfolios, strengthening protection for the agentic workspace, where people and AI agents interact across communication and data environments to execute business-c… Continue reading Proofpoint unifies email, data, and AI security to reduce enterprise blind spots

Zluri addresses expanding identity attack surface across SaaS, cloud, and AI

Enterprise identity is undergoing a fundamental shift. Employees are no longer the only identities operating inside organizations. Service accounts, machine identities, application integrations, and AI agents now interact with enterprise systems at sca… Continue reading Zluri addresses expanding identity attack surface across SaaS, cloud, and AI

Zero Networks Kubernetes Access Matrix exposes hidden access paths and blast radius

Zero Networks has announced the Kubernetes Access Matrix, a real time visual map that exposes every allowed and denied rule inside Kubernetes clusters. The new capability enables security and DevOps teams to see, understand, and control Kubernetes acce… Continue reading Zero Networks Kubernetes Access Matrix exposes hidden access paths and blast radius

Booz Allen’s Vellox brings AI vs. AI defense to protect critical infrastructure and national security

Booz Allen Hamilton’s new Vellox suite showcases how AI-native cyber defense can counter growing threats to U.S. national security and critical infrastructure. The company’s new threat report, When Cyberattacks Happen at AI Speed, shows that AI is wide… Continue reading Booz Allen’s Vellox brings AI vs. AI defense to protect critical infrastructure and national security

Rapid7 enhances Exposure Command with runtime validation and DSPM for risk analysis

Rapid7 has unveiled new cloud security capabilities within Exposure Command. The introduction of runtime validation and Data Security Posture Management (DSPM) enables organizations to identify, validate, and prioritize exploitable risks based on real-… Continue reading Rapid7 enhances Exposure Command with runtime validation and DSPM for risk analysis

Semgrep Multimodal brings AI reasoning and rule-based analysis to code security

Semgrep announced Semgrep Multimodal, a system that combines AI reasoning with rule-based analysis for detection, triage, and remediation. Its detection finds up to 8x more true positives while cutting noise by 50% compared to foundation models alone, … Continue reading Semgrep Multimodal brings AI reasoning and rule-based analysis to code security

ConductorOne unveils AI Access Management to accelerate secure, compliant AI adoption

ConductorOne has announced its AI Access Management product extension, a unified control plane for managing access to AI tools, agents, and MCP connections across the enterprise. The platform enables organizations to accelerate AI adoption while mainta… Continue reading ConductorOne unveils AI Access Management to accelerate secure, compliant AI adoption