ThreatX extends API protection with sensitive data detection and visualizations

ThreatX has unveiled new sensitive data exposure capabilities for APIs that help security teams detect and visualize API transactions that contain sensitive user information (e.g., personally identifiable information) and authentication data. This will… Continue reading ThreatX extends API protection with sensitive data detection and visualizations

XDR Alliance unveils open-source API specifications to improve cybersecurity for customers

The XDR Alliance released a new set of open-source API specifications that help leading cybersecurity vendors collaborate and integrate their technology solutions. As a result, end user customer organizations worldwide can rationalize their disparate a… Continue reading XDR Alliance unveils open-source API specifications to improve cybersecurity for customers

SecurityScorecard unveils Managed Cyber Risk Services to solve the third-party cyber risk puzzle

SecurityScorecard has unveiled new partner-focused Managed Cyber Risk Services designed to help customers of all types and sizes operationalize third-party cyber risk management. With 98% of organizations having a relationship with at least one-third p… Continue reading SecurityScorecard unveils Managed Cyber Risk Services to solve the third-party cyber risk puzzle

NetSPI launches ML/AI Pentesting solution to help organizations build more secure models

NetSPI has debuted its ML/AI Pentesting solution to bring a more holistic and proactive approach to safeguarding machine learning model implementations. The solution focuses on two core components: Identifying, analyzing, and remediating vulnerabilitie… Continue reading NetSPI launches ML/AI Pentesting solution to help organizations build more secure models

Open Raven automates attack prevention and remediation with DDR capabilities

Open Raven announced Data Detection and Response (DDR) capabilities, support for Amazon Redshift, workflow automations, real-time scanning, and AI-enabled asset discovery. These new developments build on existing automated data discovery, classificatio… Continue reading Open Raven automates attack prevention and remediation with DDR capabilities

Solvo SecurityGenie helps organizations improve their cloud security posture

Cloud security breaches are a major threat to organizations with an average detection time of 277 days and human error contributing to 85% of Incidents. To address this challenge, Solvo launched SecurityGenie, a prompt-based cloud security solution wit… Continue reading Solvo SecurityGenie helps organizations improve their cloud security posture

ThreatConnect empowers security teams to operationalize intelligence requirements

ThreatConnect announced its new Intelligence Requirement capability. This new capability strengthens ThreatConnect’s TI Ops Platform by allowing customers to define, manage, and track their intelligence requirements (IRs), priority intelligence r… Continue reading ThreatConnect empowers security teams to operationalize intelligence requirements

Hunters partners with Kudelski Security to help companies strengthen their cyber resilience

To help companies strengthen their cyber resilience and revolutionize their security operations, Hunters and Kudelski Security have entered a strategic partnership, cybersecurity company Hunters announced. As part of the partnership, Kudelski Security … Continue reading Hunters partners with Kudelski Security to help companies strengthen their cyber resilience

Budget constraints threaten cybersecurity in government bodies

Government organizations are attractive targets for threat actors whose motivations may be geopolitical, financial, or disruption, according to BlackBerry. Because threat actors may include private individuals, small groups, or state-sponsored APT grou… Continue reading Budget constraints threaten cybersecurity in government bodies