News

Capturing the Essence of Powerful Secrets Scanning Wondering how to enhance your organization’s cybersecurity measures? Among the vast spectrum of cybersecurity tools available, secrets scanning is ...
Are You Confident Your Data Safety Measures Are Up to Scratch? The rise of digital transformation is not without its pitfalls, one of which is the challenge of maintaining data safety and security.
Matter? How often do we consider the impact of Non-Human Identities (NHIs) on our data security? The management of NHIs and their accompanying secrets has become an indispensable necessity for ...
Bugcrowd today at the 2025 RSA Conference announced its intent to create a red team service to test cybersecurity defenses using a global network of ...
Blackpoint Cyber today at the 2025 RSA Conference unveiled a unified security posture and response platform that is based on the company’s managed ...
Anthropic shows how bad actors are using its Claude AI models for a range of campaigns that include influence-as-a-service, credential stuffing, and recruitment scams and becomes the latest AI company ...
Accelerating its aggressive foray into artificial intelligence (AI) security, Palo Alto Networks Inc. on Monday said it has agreed to acquire ...
No matter the size or industry, businesses that handle payment card data must comply with PCI DSS (Payment Card Industry Data Security Standard). However, not all businesses have the same compliance ...
AppOmni at the 2025 RSA Conference today added a Model Context Protocol (MCP) server to its platform for protecting software-as-a-service (SaaS) ...
Windscribe, a globally used privacy-first VPN service, announced today that its founder, Yegor Sak, has been fully acquitted by a court in Athens, Greece, following a two-year legal battle in which ...
Wallarm at the 2025 RSA Conference announced that, starting this summer, it will extend the reach of its platform for securing application programming ...
Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable CIO ...