Security Technology & Operations

Palo Alto Networks Acquires Cloud-Based Company Aporeto

Palo Alto Networks has acquired Aporeto, a machine-identity-based microsegmentation company, for $150 million. As Palo Alto seeks to solidify itself as a cloud-centric...

Avatier Releases AI Chatbot to Automate Common IAM Helpdesk Requests

Avatier, an IAM vendor, has developed an innovative solution for automating mundane IAM tasks: a chatbot called Apollo. Apollo is a great example of how ANI can enable...

Panorays Enhances Its Cyber Risk Ratings Product With New Dark Web Monitoring Features

Dark web monitoring for supply chain risk is becoming a mandatory feature for cyber risk ratings providers. Panorays’ latest press release shows that it is catching up to...

NormShield Now Allows You to Quantify Supply Chain Risk in Dollars. But Is That a Good Thing?

Normshield recently announced that it has licensed the FAIR model to allow customers to quantify supply chain security risk in terms of financial impacts. It is...

McAfee Ramps Its CASB FedRAMP Authorization Level Up to High

In the thrilling world of FedRAMP, achieving a High impact level authorization is as exhilarating as it gets. McAfee has achieved this exciting apex for its MVISION Cloud...

Mimecast Announces New Threat Intel Feed for Your Security Devices at Blackhat 2019

Mimecast announces a new threat intelligence platform at Blackhat 2019, offering customers a new means to feed threat intelligence into security devices such as SIEM,...

Proofpoint and CrowdStrike Partner to Protect Email and Endpoints

On September 4, Proofpoint announced its partnership with CrowdStrike to offer advanced threat protection across email and endpoints.

Cisco Suffers Security Flaw With Zoom Interoperability

Cisco is beginning to lose patience with its Zoom interoperability after another Zoom security risk: access for the Zoom Connector for Cisco hosted on zoom.us did not...

Darktrace Masters the Art of Storytelling With Cyber AI Analyst

Darktrace introduced a “Cyber AI Analyst” in September 2019 as a means of offloading incident management responsibilities from InfoSec practitioners. This new feature...

Data Breach Reporting Requirements Summary

Use this template to help keep track of your regulatory reporting requirements following a data breach.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us