Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Mobile device management is a crucial component of maintaining a stable security posture, but mobile device management and unified endpoint management → Read More
Mobile device management is a crucial component of maintaining a stable security posture, but mobile device management and unified endpoint management → Read More
Until recently, the critical task of security testing was primarily performed through time-consuming, costly and laboriously manual penetration testing. → Read More
Vendor: Cymulate Price: $40,000-$500,000 based on company size and number of attack vectors.Contact: cymulate.com What it does: Cymulate divides the → Read More
Vendor: Picus Security Inc.Price: $25,000 per assessment vectorContact: picussecurity.com What it does: Leverages continuous, metrics-based validation to → Read More
Vendor: SafeBreachPrice: Dependent on the size of the deployment.Contact: safebreach.com What it does: Leverages thousands of attack simulations to → Read More
Vendor: XM CyberPrice: Yearly license based on net- work size.Contact: xmcyber.com What it does: Leverages simulations with Purple Team functionality to → Read More
Vendor: AttackIQ Price: $5,000 per Test Point Engine.Contact: attackiq.com What it does: AttackIQ Platform assists Red and Blue Teams by continuously → Read More
This month we take another look at risk management tools, a group that is evolving and continuing the trend of adding new features and taking interesting → Read More
It seems every month SC Labs talks about the growing connectivity of the world and the growing threat landscape alongside the growing the need for → Read More