Cyera Taps Microsoft OpenAI Service to Improve Data Security
Cyera this week revealed it integrated its namesake data security platform with the Microsoft Azure OpenAI cloud service to enable organizations to apply cybersecurity, privacy and compliance policy more consistently. Ari Weil, vice president of marketing for Cyera, said the integration would enable cybersecurity teams to employ a natural language ... Read More
Sentra Adds Tool for Redacting Generative AI Prompts
Sentra this week introduced a tool that automatically redacts personally identifiable information (PII) from prompts used to share data with either the ChatGPT or Google Bard generative artificial intelligence (AI) platform. Sentra CTO Ron Reiter said Sentra ChatDLP Anonymizer would enable organizations to strike a balance between an outright ban ... Read More
Wiz Previews Sensor to Secure Cloud Application Workloads
Wiz this week made available a preview of a sensor for securing workloads that it will add to its cloud-native application protection platform (CNAPP). Yinon Costica, vice president of product for Wiz, said the Runtime Sensor is an agent that extends the capabilities of the Wiz platform to better secure ... Read More
Sysdig Extends Reach of CNAPP Via Agentless Edition of Falco
Sysdig today extended the reach of its cloud-native application protection platform (CNAPP) using an agentless implementation of the Falco engine it created to protect runtime environments. Announced at the Gartner Security and Risk Summit conference, that addition, for the first time, brings real-time cloud detection and response capabilities to the ... Read More
Lacework Adds Ability to Manage and Secure Cloud Identities
Lacework today added cloud infrastructure entitlement management (CIEM) capabilities to its cloud-native application protection platform (CNAPP). The CIEM addition provides cybersecurity teams visibility into who within an organization has permission to access a specific cloud service. Adam Leftik, vice president of product for Lacework, said the goal is to make ... Read More
FireTail Report Finds API Security Breaches are few but Lethal
An analysis of cybersecurity breaches in 2022 conducted by FireTail, a provider of a platform for securing application programming interfaces (APIs), found only 12 publicly recorded breaches involving APIs, with six more being disclosed thus far in 2023. However, the average mean size of API data breach exposure is over ... Read More
Red Sift Taps GPT-4 to Better Identify Cybersecurity Threats
Red Sift today announced it is employing the GPT-4 generative artificial intelligence (AI) platform via a Relevance Detection capability to better determine whether a suspicious online entity should be monitored. Previously, Red Sift was applying machine learning algorithms to analyze domain name system (DNS) platforms, secure socket layer (SSL) certificates ... Read More
Dell Launches Project Fort Zero Service to Accelerate Zero-Trust IT Shift
Dell Technologies today launched a Project Fort Zero cybersecurity services initiative that promises to make it simpler for organizations to transition to zero-trust IT environments. The initiative is based on a reference architecture defined by the U.S. Department of Defense (DoD). Announced at the Dell Technologies World conference, Dell will ... Read More
Teleport Adds Hosted Option to Managed Infrastructure Access
Teleport today updated its namesake open source infrastructure access management platform to include a teams option that the company hosts and manages. In addition, Teleport 13 now provides a single access point that acts as a proxy for all the network protocols IT teams use to access network infrastructure. Teleport ... Read More
Aviatrix Distributed Cloud Firewall Streamlines App Security
Aviatrix today made generally available a Distributed Cloud Firewall (DCF) that programmatically pushes and enforces cybersecurity policies for cloud computing environments via a central console. Rod Stuhlmuller, vice president of solutions marketing for Aviatrix, said DCF is unique in that cybersecurity teams can now inspect traffic and enforce policies wherever ... Read More