Barracuda Cloud Application Protection enhancements improve web application and API security

Barracuda Networks announced the expansion of Barracuda Cloud Application Protection, its platform for Web Application and API Protection (WAAP). This new release adds powerful new automated API Discovery and GraphQL security capabilities, augments Account Takeover Protection capabilities, and enhances the client-side protection feature set. Additionally, the integration of Barracuda Web Application Firewall and Venafi Trust […]

Continue Reading

Skybox Security unveils cyber risk quantification capabilities to help users prioritize critical threats

Skybox Security unveiled new automated cyber risk quantification capabilities. Leveraging its proprietary network modeling techniques, Skybox now quantifies the business impact of cyber risks into economic impact. This new financial calculation enables customers to identify and prioritize the most critical threats based on the size of financial impact, among other risk analyses. “Other industry solutions […]

Continue Reading

Intertrust launches two features for enterprises aiming to protect data operations and IoT devices

Intertrust launched two major feature enhancements to its multi-party data interoperability platform, Intertrust Platform, that create trust and provide protection by bridging enterprise data operations and IoT devices with single pane of glass functionality. Intertrust Platform now includes two business-critical features for IoT and Web3.0 (Web3) environments: Explicit Private Networking (XPN) – Intertrust Platform XPN […]

Continue Reading

Ground Labs Enterprise Recon 2.6 accelerates PII scanning and data compliance

Ground Labs released Enterprise Recon 2.6, which addresses modern security standards and expands scanning capabilities across all major cloud storage platforms. This new release introduces new platform integrations along with improved authentication workflows to ensure compliance while supporting enterprise remediation and interoperability. Enterprise Recon is a smart data discovery solution that enables organizations to find […]

Continue Reading

Skyflow releases MuleSoft Certified Connector to help customers protect sensitive data

Skyflow launched a new MuleSoft Certified Connector and joined the MuleSoft Technology Partner Program. Now, MuleSoft customers can leverage Skyflow’s Data Privacy Vault to protect and store sensitive information flowing through the MuleSoft gateway. Delivered as a developer-friendly API, Skyflow enables companies to build apps with the highest levels of data privacy, security, and compliance. […]

Continue Reading

Trusona Authentication Cloud delivers passwordless sign-ins without an app

Trusona announced Trusona Authentication Cloud, an app-less passwordless MFA solution designed to improve business growth and profitability with a “tap and go” sign-in experience. Trusona Authentication Cloud delivers a simple sign-in experience that is multi-factor, does not require an app and delivers rapid time-to-value at low cost when deploying FIDO and WebAuthn. The solution is […]

Continue Reading

Fusion Risk Management strengthens its offerings for technology and data service providers

Fusion Risk Management announced that it is further strengthening its offerings to help technology and data service providers bolster the resiliency of digital elements of critical value chains. As a trusted risk and resiliency technology and services provider to globally and domestically significant financial institutions, Fusion recognizes the critical role of technology and data service […]

Continue Reading

Lacework introduces new features to provide security in Kubernetes environments

Lacework announced new features added to the Polygraph Data Platform which provide enhanced visibility and protection in Kubernetes environments. Through Kubernetes audit log monitoring, integration with the Kubernetes admission controller, and Infrastructure as Code (IaC) security, Lacework customers can now further minimize risks in build time and automate discovery of unusual behavior that could signify […]

Continue Reading

Microchip unveils CEC1736 Trust Shield family to offer protection against rapidly evolving security threats

As the market need for security evolves, platforms must also evolve quickly to defend against cyber attacks during start-up, real-time and system updates. With these new market threats, designers cannot assume the equipment they are using is trustworthy and they must start looking to new technology to secure their systems. Microchip Technology announced its fully […]

Continue Reading

SecZetta and Active Cyber help clients optimize their third-party identity governance processes

SecZetta announced a new partnership with Active Cyber, a cloud consultancy, specializing in the implementation of Cloud-based Identity & Access Management (IAM) solutions. Active Cyber will resell the SecZetta Third-Party Identity Risk solution and provide consulting and implementation services to organizations seeking to implement a complete, zero-trust solution to their third-party non-employee challenges. Organizations in […]

Continue Reading