ElectionShield protects political campaigns from online threats

ElectionShield utilizes BrandShield’s technology to protect political campaigns and candidates from a growing range of online threats. These include social impersonation; fraudulent fundraising schemes; domain squatting; sale of unauthorized merchandis… Continue reading ElectionShield protects political campaigns from online threats

CyberX integrates with Microsoft Azure Security Center

CyberX announced a new API-level integration with Microsoft Azure Security Center for IoT, enabling joint clients to gain a unified view of security across all their managed and unmanaged IoT devices. The combination of CyberX’s agentless security plat… Continue reading CyberX integrates with Microsoft Azure Security Center

Zero Networks Access Orchestrator: Autonomous, airtight network access security at scale

Zero Networks unveiled the Zero Networks Access Orchestrator, the first network security platform that automatically defines, enforces and adapts user- and machine-level network access policies to create a continuous airtight zero trust network model, … Continue reading Zero Networks Access Orchestrator: Autonomous, airtight network access security at scale

ProcessUnity Vendor Risk Management expanded to include new best practices configuration

ProcessUnity, a leading provider of cloud-based applications for risk and compliance management, today announced a new pre-built configuration of its award-winning Vendor Risk Management solution. Best Practices Configuration for ProcessUnity Vendor Ri… Continue reading ProcessUnity Vendor Risk Management expanded to include new best practices configuration

Cloud misconfigurations surge, organizations need continuous controls

Nearly 33.4 billion records were exposed in breaches due to cloud misconfigurations in 2018 and 2019, amounting to nearly $5 trillion in costs to enterprises globally, according to DivvyCloud research. Companies failing to adopt a holistic approach to … Continue reading Cloud misconfigurations surge, organizations need continuous controls

Cymatic presents all-in-one web application defense platform at RSAC 2020

Cymatic announced its participation in RSAC 2020 to demonstrate the success of the only unified web defense that deploys at the client through a simple line of JavaScript without agents or proxies to deliver first-look, first-strike capability that is … Continue reading Cymatic presents all-in-one web application defense platform at RSAC 2020

Is your network already compromised? LUMU illuminates network blind spots

LUMU has come out of stealth mode and for the first time will be publicly showcasing its solution at this year’s RSA Conference. LUMU was founded in 2019 by cybersecurity veteran and serial entrepreneur Ricardo Villadiego, who previously founded Easy S… Continue reading Is your network already compromised? LUMU illuminates network blind spots

SentinelOne Singularity: AI-Powered XDR platform transforms enterprise security

SentinelOne unveiled its Singularity Platform, an industry first data lake that fuses together the data, access, control, and integration planes of its endpoint protection (EPP), endpoint detection and response (EDR), IoT security, and cloud workload p… Continue reading SentinelOne Singularity: AI-Powered XDR platform transforms enterprise security

IronKey D300 features advanced security, achieves NATO Restricted Level Certification

Kingston Digital announced its IronKey D300 Encrypted USB Flash Drive series has achieved NATO Restricted Level Certification. This indicates that, after a detailed validation process, the Kingston IronKey D300, IronKey D300S and IronKey D300SM have be… Continue reading IronKey D300 features advanced security, achieves NATO Restricted Level Certification