Applications

DMARC Email Security Technology

By default, email is not secure. That's not an inflammatory statement, just the...

Simility’s AI-Enabled Fraud Prevention Technology Attracts $17.5M Investment

Palo Alto, Calif.-based Simility, a fraud prevention technology startup, announced on Dec. 12 that it had raised $17.5 million in a Series...

Open Source Patch Management: Options for DIYers

CVE-2017-5638 is the code vulnerability that will long live in the corporate memory...

Prevoty Rakes in $13 Million in New Funding

Prevoty, a Los Angeles cyber security startup, announced on Dec. 6 that it...

NeuVector Courts Large-Scale Enterprise Container Deployments

Less than a week after NeuVector announced it had raised $7 million in Series A funding round, the company announced version of...

Container Security Startup NeuVector Raises $7 Million

NeuVector, a container security startup, announced today that it has successfully completed a Series A round of financing totaling $7 million. Hummer...

WordPress 4.8.3 Fixes Critical SQL Injection Vulnerability

Boo! On Oct. 31, the open-source WordPress content management (CMS) and blogging...

Contrast Security Secures $30 Million in New Funding

Contrast Security announced on Oct. 19 that it had raised $30 million in a...

Trusona Raises $10M to Kill Passwords

That didn't take long.After emerging from stealth with $8 million in Series...

IBM Cloud Identity Offers Identity & Access Management Tools

Big Blue this week took the wraps off IBM Cloud Identity Connect, its...

Latest articles

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in...

Top 10 Governance, Risk and Compliance (GRC) Vendors

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Data privacy...

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...