Cyberhaven, the global leader in AI-native data security, today announced it has expanded its procurement options to include all three major cloud hyperscaler marketplaces: AWS Marketplace, Microsoft ...
Varonis Systems, Inc. has announced that its cloud-native Data Security Platform is the first in its category to receive FedRAMP Authorization, underscoring its commitment to data security for federal ...
MENLO PARK, Calif.--(BUSINESS WIRE)--Bedrock Security, the frictionless data security company, today unveiled its comprehensive data security platform. Empowering organizations to effectively manage ...
MIAMI, May 19, 2025 (GLOBE NEWSWIRE) -- Varonis Systems, Inc. (Nasdaq: VRNS), the leader in data security, proudly announces that its cloud-native Data Security Platform is the first in its category ...
Salesforce Inc. co-founder and Chief Executive Marc Benioff is articulating a bold vision for the next era of enterprise software. In an exclusive interview with theCUBE on April 25, Benioff outlined ...
Data security software provider Rubrik Inc. today announced a range of new cyber resilience features at its annual Cyber Resilience Summit, with updates that focus on helping organizations better ...
Protecting one’s data is crucial at a time when hackers, data breaches, and other cybersecurity threats are more prevalent than ever. However, protecting that data isn’t just about having a strong ...
Cloud storage security has become essential as more sensitive personal and business data moves online. While most providers encrypt data at rest and in transit using AES-256 and TLS 1.3, server-side ...
Cloud platforms have reshaped how organizations store, process, and share information, but they also introduce new risks to business data. Misconfigured storage, weak credentials, and unmanaged access ...
The data center physical security market thrives on integrated, scalable solutions, emphasizing software-driven platforms, ...
Cybersecurity incidents are generating some pretty scary headlines these days with the seemingly never-ending stream of ransomware, phishing, malware, zero-day exploit and denial of service attacks.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results