Topic: Security
Salt Security Delivers Another Industry Breakthrough with First AI-Infused API Security Platform to Address Proliferation of GenAI Application Development
Salt’s LLM, Pepper, has been used for years to stop API-based attacks and has now been extended to the continuous API discovery and posture assurance steps in the API Security lifecycle
Voice of the Vendor: Kaseya Connect 2024
Join ChannelPro’s traveling reporter Joel Zaidspiner at Kaseya Connect 2024 in New Jersey.
Utimaco Extends Trust as a Service Cloud Marketplace with General Purpose HSM
The streamlined marketplace provides simplified deployment and delivery options.
Proofpoint Sets New Industry Standard in Email Security with Adaptive Threat Protection Capabilities Across the Entire Email Delivery Chain
Customers now benefit from both new pre-delivery social engineering and link protection and post-delivery behavioral AI capabilities to stop the techniques threat actors depend on
Sumo Logic Unveils New Innovations to Align and Fuel DevSecOps
New features across AI, real-time threat intelligence and cloud SIEM deliver a comprehensive view of potential threats, break down team silos, and deliver actionable security insights.
XM Cyber Report Finds 80% of Security Exposures Are Fueled by Misconfigurations
Third annual State of Exposure Management Report reveals alarming gaps in organizations’ cyber defenses.
LevelBlue Launches at RSA Conference, Bolstering Organizations’ Cyber Resilience While Eliminating Complexity
WillJam Ventures and AT&T close joint venture to form new managed cybersecurity services business.
Commvault Turns the Concept of Cleanrooms on Its Head: Democratizing the Technology and Giving CISOs / CIOs Confidence They Can Recover When Attacked
Under Constant Threat of Attack, CXOs Can Affordably Test their Cyber Recovery Plans On-Demand and Orchestrate Rapid Recovery to a Clean Location in the Cloud
Swimlane Delivers the First Full-stack Modular Marketplace for Security Automation
Company announces low-code marketplace with infinite integrations and dynamically expanding content.
For Authentication, There’s a Better Way than MFA
Today, sophisticated cybercriminals have developed many strategies to bypass MFA, exploiting its weaknesses, particularly through social engineering and other hacking techniques.