Zimperium Teams Up With Okta to Enhance Zero-Trust Identity Threat Protection With AI-Driven Mobile Security Solutions

August 14, 2024 at 02:53PM Zimperium and Okta’s collaboration marks a milestone in mobile security, integrating Zimperium Mobile Threat Defense with Okta Identity Threat Protection. This partnership enables continuous risk monitoring and automated threat response, upholding a zero trust framework. The integration empowers organizations with real-time threat intelligence, comprehensive mobile threat protection, and stronger zero-trust … Read more

Startup Spotlight: LeakSignal Helps Plug Leaky Data in Organizations

August 5, 2024 at 01:15PM LeakSignal is an openly distributed data governance solution, aiming to tackle data leakage within organizations. It offers real-time data flow governance, using natural language processing techniques and Rust technology. The company is a finalist in the Black Hat Startup Spotlight competition, emphasizing proactive monitoring and alerting. Its mascot idea is … Read more

Lakera Raises $20M Series A to Secure Generative AI Applications

July 29, 2024 at 05:39PM Lakera, a leading real-time GenAI security company, secured $20 million in Series A funding. This brings their total funding to $30 million and positions them at the forefront of securing GenAI applications. With a prediction of increased GenAI adoption, Lakera’s platform is expected to see continued demand. The company plans … Read more

Top 10 Critical Pentest Findings 2024: What You Need to Know

June 11, 2024 at 07:48AM Vonahi Security’s vPenTest platform released an annual report on the top 10 critical pentest findings in 2024, following the analysis of over 10,000 network pentests at 1,200 organizations. The report covers various vulnerabilities, such as MDNS and NBNS Spoofing, and provides recommendations for prevention. vPenTest offers automated network penetration testing, … Read more

OpenSSF Siren to Share Threat Intelligence for Open Source Software

May 21, 2024 at 08:08AM The Open Source Security Foundation has announced the launch of an email mailing list called Siren, which aims to share real-time security threat intelligence and create a community-driven knowledge base. The list will allow members to exchange information on tactics, techniques, and procedures related to attacks on open source software. … Read more

The OODA Loop: The Military Model That Speeds Up Cybersecurity Response

March 25, 2024 at 03:00PM In the fast-paced realm of cybersecurity, time is of the essence. Cybercriminals exploit vulnerabilities within 24 hours of access. To combat this, the OODA Loop Military Model, built on Observe, Orient, Decide, and Act, aids defenders. SASE, a cloud-native architecture, harnesses this model by consolidating security controls, enabling real-time visibility, … Read more

Dymium Snags $7M to Build Data Security Platform with Secure AI Chat 

March 21, 2024 at 12:00PM Dymium, a California startup, secures $7 million in funding from Two Bear Capital and angel investors. The company offers enterprise data protection products, including a platform that integrates with existing IAM infrastructure and a SecureChat AI portal. Its solutions ensure real-time, transparent data governance and PII protection, with deployment options … Read more

Nozomi Unveils Wireless Security Sensor for OT, IoT Environments 

January 26, 2024 at 05:15AM Nozomi Networks has launched Guardian Air, a security sensor for detecting wireless threats in OT and IoT environments. The product monitors various frequencies associated with wireless protocols and sends data to a cloud-based system for analysis. It provides visibility at the wireless level and is designed to be integrated into … Read more

Stream Security Expands into CloudSecOps Market With Launch of Real-Time Cloud Security Solution

November 14, 2023 at 10:14PM Stream Security, previously known as Lightlytics, has announced its expansion into cloud security. The company has introduced a real-time Cloud Twin technology that allows organizations to detect and investigate threats in their cloud environment. The Cloud Twin continuously models the cloud environment, enabling improved collaboration between security and operations teams. … Read more

By proceeding you understand and give your consent that your IP address and browser information might be processed by the security plugins installed on this site.
×