Adaptive Security Inc., a startup that helps companies test their cybersecurity posture using simulated social engineering attacks, has raised $43 million in fresh funding. Andreessen Horowitz and the ...
LOS ANGELES--(BUSINESS WIRE)--Resecurity (USA), a leader in cybersecurity solutions, proudly announces the launch of Resecurity One, the next-generation cybersecurity platform designed to ...
In recent years, six focal areas have emerged as primary attractors around which cybersecurity technology platforms have gathered – a significant trend in this market. More recently still, we’ve seen ...
BOSTON--(BUSINESS WIRE)--Lookout, Inc., the data-centric cloud security company, today announced that Lookout Mobile Endpoint Security has won the “Threat Detection Platform of the Year” award in the ...
With the volume of security data growing rapidly, many chief information security officers (CISOs) face a daunting challenge: how to achieve comprehensive security coverage amid tightening budgets.
Data security is a prominent concern for organizations, and many are adjusting to a new way of thinking in order to address the rising number of leaks and breaches. London-based data management ...
Databricks new Data Intelligence for Cybersecurity, built on the same data lakehouse architecture as the company’s flagship data and AI platform, is designed to help security teams more efficiently ...
Security professionals tasked with protecting their organizations from cyberthreats often have to juggle a host of different programs, services, and products. That scattershot approach can make their ...
Veeam Data Platform v13 Launches and Redefines the Standard for Cyber Resilience, Advanced Data Protection, Security and Identity Controls, and AI-Powered Intelligence Along with new capabilities to ...
In 2025, data centers face a rapidly evolving security landscape, driven by technological advancements like artificial intelligence, cloud integration, the Internet of Things, and a rise in ...
A single, unified approach to security may be the answer to the complex challenge of managing myriad tools and systems. As new vulnerabilities have emerged, so have a rush of new point solutions ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results