Shweta Sharma

Senior Writer

Shweta Sharma is a senior journalist covering enterprise information security and digital ledger technologies for IDG’s CSO Online, Computerworld, and other enterprise sites.

Revelstoke’s SOAR to improve case management with replicable sub-workflows

Asia could be placing all the wrong cybersecurity bets

Asia could be placing all the wrong cybersecurity bets

Only 12% of companies in Asia quantify their financial exposure to cyber threats, less than half the global average of 26% according to a recent study by Microsoft and Marsh.

Sysdig Secure update adds ability to stop container attacks at runtime

Sysdig Secure update adds ability to stop container attacks at runtime

Sysdig's Drift Control detects and stops attempts to run packages or binary files that were added or modified at runtime.

Russian DDoS attack on Lithuania was planned on Telegram, Flashpoint says

Russian DDoS attack on Lithuania was planned on Telegram, Flashpoint says

Russian cybercollective Killnet dropped evidence of possible collaboration with ransomware gang Conti in its hacking campaign against Lithuania on a Telegram channel, security company Flashpoint reports.

Security startup Cerby debuts with platform to manage shadow IT

Security startup Cerby debuts with platform to manage shadow IT

The Cerby system automates and streamlines the detection and protection of "unmanageable" applications, providing a platform that centralizes application enrollment, access and monitoring.

Italian spyware firm is hacking into iOS and Android devices, Google says

Italian spyware firm is hacking into iOS and Android devices, Google says

RCS Lab spyware uses known exploits to install harmful payloads and steal private user data, according to a Google report.

Cisco reports vulnerabilities in products including email and web manager

Cisco reports vulnerabilities in products including email and web manager

New vulnerabilities found in Cisco internal testing allow remote access and scripting that could lead to the loss of sensitive user data.

Microsoft includes IoT devices under its Secured-core program

Microsoft includes IoT devices under its Secured-core program

The Edge Secured-core, program is designed to validate IoT devices for specific security hardware technology, and ensure users that they are running an OS with built-in security technology.

Cato Networks offers new capability for network-based ransomware protection

Cato Networks offers new capability for network-based ransomware protection

New machine learning algorithms scan server traffic to detect and eliminate ransomware attacks across Cato's customer network.

Leading cybersecurity vendors join Mandiant's new Cyber Alliance Program

Leading cybersecurity vendors join Mandiant's new Cyber Alliance Program

The alliance aims to develop integrated security systems and share threat intelligence, and lists partners including Google, Cloudflare, CrowdStrike, SentinelOne and Microsoft as founding members.

Snowflake offers cybersecurity data platform with security app integrations

Snowflake offers cybersecurity data platform with security app integrations

Snowflake's cybersecurity workload integrates the company's data cloud, storage and query features with tools from cybersecurity vendors, for enhanced threat detection, investigation and alerts.

Hottest new cybersecurity products at RSA 2022
Updated

Hottest new cybersecurity products at RSA 2022

The annual RSA Conference is an opportunity for companies to showcase their latest cybersecurity products. Here are some of the most interesting new products being shown at RSA Conference 2022.

10 of the hottest new cybersecurity startups at RSA 2022

10 of the hottest new cybersecurity startups at RSA 2022

Cybersecurity startup companies use the RSA Conference to make their public debut and showcase their products. Here are some of the more interesting security startups showcasing their capabilities this year.

PIXM releases new computer vision solution for mobile phishing

PIXM releases new computer vision solution for mobile phishing

PIXM Mobile uses computer vision tech to identify and stop phishing attacks on mobile devices in real time, as a user clicks on a malicious link.

HYAS brings security threat detection, response to production networks

HYAS brings security threat detection, response to production networks

HYAS Confront uses domain expertise and proprietary machine learning to monitor and detect anomalies in production network environments and improve visibility as applications move to the cloud.

Deepfence Cloud builds on ThreatStryker security observability platform

Deepfence Cloud builds on ThreatStryker security observability platform

The SaaS version of ThreatStryker will build on its real-time observation and protection abilities, spanning multiple cloud and development instances.

Rezilion launches Dynamic SBOM for software supply chain devsecops

Rezilion launches Dynamic SBOM for software supply chain devsecops

Rezilion’s new Dynamic SBOM (software bill of materials) works with its devsecops platform and is designed to help security teams understand how software components are being executed in runtime.

Intel bets big on security as a service for confidential computing

Intel bets big on security as a service for confidential computing

At its inaugural Vision event, Intel launched a security as a service initiative called Project Amber for confidential computing in the cloud, and outlined its support for secure and responsible AI and quantum-resistant cryptography....

ForgeRock offers AI-based solution for identity-based cyberattacks

ForgeRock offers AI-based solution for identity-based cyberattacks

ForgeRock Autonomous Access is designed to eliminate account takeovers and prevent fraud in real-time, using a combination of AI and advanced pattern recognition.

Dell offers data, app recovery support for multicloud assets

Dell offers data, app recovery support for multicloud assets

Dell is adding data recovery solutions to its APEX portfolio, for data centers and public clouds including Azure and AWS.

Load More