Google Drive

Adaptive Shield Extends SaaS Entitlement Management to Drive SaaS Security Consolidation

Retrieved on: 
tisdag, maj 28, 2024

To secure emerging SaaS attack surfaces, Adaptive Shield has extended the capabilities of its SaaS Security Posture Management (SSPM) unified platform to cover complex Permissions and Shared Data.

Key Points: 
  • To secure emerging SaaS attack surfaces, Adaptive Shield has extended the capabilities of its SaaS Security Posture Management (SSPM) unified platform to cover complex Permissions and Shared Data.
  • View the full release here: https://www.businesswire.com/news/home/20240528441415/en/
    Figure 1: The Adaptive Shield Permission Inventory (Graphic: Business Wire)
    “SaaS security impacts the entire organization, affecting security teams, auditors and app owners.
  • Our platform consolidates and unifies all threat prevention and detection efforts, allowing enterprises to safely rely on both out-of-the-box and homegrown SaaS applications," said Maor Bin, CEO and co-founder of Adaptive Shield.
  • This is why Adaptive Shield has prioritized these emerging use cases:
    The Permission Inventory gives customers deep visibility into permission structures at the SaaS stack level through an automated approach.

Huntress Releases 2024 Cyber Threat Report, Highlights Increased Targeting of Healthcare and Other Vital Industries

Retrieved on: 
onsdag, maj 22, 2024

COLUMBIA, Md., May 22, 2024 (GLOBE NEWSWIRE) -- Huntress unveiled its 2024 Cyber Threat Report today.

Key Points: 
  • COLUMBIA, Md., May 22, 2024 (GLOBE NEWSWIRE) -- Huntress unveiled its 2024 Cyber Threat Report today.
  • Delivering insightful reporting on emerging cyber threats and tradecraft targeting small businesses and mid-sized enterprises, Huntress highlights ways threat actors showed their true colors.
  • “We saw that no business or industry is ‘off the table’ for attackers,” said Jamie Levy, Director of Adversary Tactics for Huntress.
  • “Last year, our inaugural threat report highlighted that attackers attempted to avoid detection by blending in and increasing account takeover tactics like business email compromise.

Introducing Glue: Work Chat for the AI Era

Retrieved on: 
tisdag, maj 14, 2024

Glue takes the best of both worlds from AI chat platforms like ChatGPT and human chat platforms like Slack.

Key Points: 
  • Glue takes the best of both worlds from AI chat platforms like ChatGPT and human chat platforms like Slack.
  • Glue allows users to start a chat with AI and then invite coworkers to it, or add AI to an existing team chat.
  • They came together to collaborate on Glue when they realized they had similar views about how to reinvent work chat.
  • “Glue is our answer to channel fatigue and the new home for AI at work,” continued Sacks.

Latest VIPRE Security Group Email Threat Trends Research Exposes Global Phishing and Malware Threat Landscape

Retrieved on: 
torsdag, maj 9, 2024

LONDON, May 9, 2024 /PRNewswire/ -- VIPRE Security Group, a global leader and award-winning cybersecurity, privacy, and data protection company, today released its Q1 2024 Email Threat Trends report, based on an analysis of 1.8 billion emails. The findings reveal the evolving landscape of email-based threats and emerging tactics malicious actors are employing.

Key Points: 
  • This research warns that 'scams' within the spam category are growing in popularity among cybercriminals, overtaking phishing emails in the first quarter of 2024.
  • "Criminals are using email with success to scam, infiltrate networks, and unleash malicious payloads," warns Usman Choudhary, Chief Product and Technology Officer, VIPRE Security Group.
  • "We're witnessing bad actors relentlessly exploiting human vulnerabilities and software flaws, circumventing email gateways and security measures with alarming precision.
  • VIPRE leverages its unique understanding of email security to equip organizations with the information they need to protect themselves.

Latest VIPRE Security Group Email Threat Trends Research Exposes Global Phishing and Malware Threat Landscape

Retrieved on: 
torsdag, maj 9, 2024

LONDON, May 9, 2024 /PRNewswire/ -- VIPRE Security Group, a global leader and award-winning cybersecurity, privacy, and data protection company, today released its Q1 2024 Email Threat Trends report, based on an analysis of 1.8 billion emails. The findings reveal the evolving landscape of email-based threats and emerging tactics malicious actors are employing.

Key Points: 
  • This research warns that 'scams' within the spam category are growing in popularity among cybercriminals, overtaking phishing emails in the first quarter of 2024.
  • "Criminals are using email with success to scam, infiltrate networks, and unleash malicious payloads," warns Usman Choudhary, Chief Product and Technology Officer, VIPRE Security Group.
  • "We're witnessing bad actors relentlessly exploiting human vulnerabilities and software flaws, circumventing email gateways and security measures with alarming precision.
  • VIPRE leverages its unique understanding of email security to equip organizations with the information they need to protect themselves.

Pryon Unveils New Offering for Enterprise Retrieval

Retrieved on: 
onsdag, maj 8, 2024

RALEIGH, N.C., May 8, 2024 /PRNewswire/ -- Today, Pryon announced the launch of its new Platform offering, the Pryon Retrieval Engine. This offering, which is focused on securely extracting information from all forms of complex content across myriad sources, enables enterprises to securely deploy Retrieval-Augmented Generative (RAG) solutions at scale and address key knowledge management use cases. Able to handle any content type from text to image to video, the Retrieval Engine is fully API-enabled for custom deployments or accessible via Pryon's own web or mobile interface for an end-to-end solution. Available on-premises or in the cloud, the Retrieval Engine unlocks dormant value for nearly any current and future AI-enabled use case.

Key Points: 
  • RALEIGH, N.C., May 8, 2024 /PRNewswire/ -- Today, Pryon announced the launch of its new Platform offering, the Pryon Retrieval Engine.
  • Retrieval is the foundation for any RAG solution, and implementing enterprise retrieval has historically presented several accuracy, scalability, security, and efficiency challenges.
  • Ensuring accuracy in retrieval is difficult due to the intricate nature of enterprise content.
  • The implementation of retrieval for an enterprise must meet the highest security and compliance standards to safeguard confidential customer data.

Lucid Software Announces Whiteboard Integrations with Google Meet Touchscreen Devices

Retrieved on: 
torsdag, maj 2, 2024

SOUTH JORDAN, Utah, May 2, 2024 /PRNewswire/ -- Lucid Software , the leader in visual collaboration software, today announced its latest whiteboard integration with Google Meet touchscreen devices.

Key Points: 
  • SOUTH JORDAN, Utah, May 2, 2024 /PRNewswire/ -- Lucid Software , the leader in visual collaboration software, today announced its latest whiteboard integration with Google Meet touchscreen devices.
  • Users will be able to start and join a Google Meet call from Board 65 and Desk 27 or start a standalone whiteboard session outside of a Meet call.
  • By integrating Lucidspark with Google Meet devices, teams are able to interact in-person on an infinite canvas while still including remote teammates on a Google Meet call.
  • Within the ecosystem of integrations with Workspace, Lucid users can also add and update Lucid documents in Google Docs, Google Sheets and Google Slides.

Virtru to Offer 1 Year of Free Encryption Key Management for Google Gmail with S/MIME Customers

Retrieved on: 
onsdag, april 10, 2024

As a trusted Google Gmail with S/MIME private key management provider, Virtru enables customers to easily control and protect their most critical data with the Virtru Private Keystore.

Key Points: 
  • As a trusted Google Gmail with S/MIME private key management provider, Virtru enables customers to easily control and protect their most critical data with the Virtru Private Keystore.
  • To use Gmail with S/MIME, Google customers must select an external key management partner, such as Virtru, or build their own key management service using Google APIs.
  • To learn more about Virtru Private Keystore and to redeem one free year* of Virtru Private Keystore for Gmail with S/MIME, contact Virtru today.
  • * – The Virtru Private Keystore one-year subscription S/MIME offer is limited to managing S/MIME encryption keys only when used with Google Gmail.

Metomic Finds 37% Of Publicly Shared Files Contain Personally Identifiable Information

Retrieved on: 
onsdag, april 10, 2024

According to Metomic, data stored in collaborative work environments and easily accessible platforms like Google Drive frequently remains untouched: 86% of the files had not been updated in 90 days, 70% in over a year, and 48% in more than two years.

Key Points: 
  • According to Metomic, data stored in collaborative work environments and easily accessible platforms like Google Drive frequently remains untouched: 86% of the files had not been updated in 90 days, 70% in over a year, and 48% in more than two years.
  • The findings highlight the lack of data management oversight happening across industries, but especially for financial services organizations that often handle exorbitant amounts of personally identifiable information (PII).
  • “Businesses are enabling unnecessary data security risks by allowing colossal amounts of outdated, stale files to take up space across their cloud-based apps.
  • “Metomic gives these organizations the tools they need to keep their cloud-based work apps safe, while also empowering them to reduce the amount of data being saved.”

Salt Security Addresses Critical OAuth Vulnerabilities By Enhancing API Security Platform with OAuth Protection Package

Retrieved on: 
torsdag, april 25, 2024

PALO ALTO, Calif., April 25, 2024 /PRNewswire/ -- Salt Security, the leading API security company, today announced the release of its new multi-layered OAuth protection package to detect attempts to exploit OAuth and proactively fix vulnerabilities. Salt is enhancing its API protection platform with a comprehensive suite of new OAuth threat detections and posture rules to address the growing challenge of OAuth exploitation. The company is the first API security vendor to launch deep OAuth threat detection capabilities, and these innovations will empower organizations to identify and mitigate malicious attempts to exploit OAuth flows, ultimately safeguarding sensitive data and user accounts.

Key Points: 
  • Salt is enhancing its API protection platform with a comprehensive suite of new OAuth threat detections and posture rules to address the growing challenge of OAuth exploitation.
  • By implementing strong OAuth security controls, organizations can safeguard their users' data, prevent unauthorized access to critical resources, and maintain user trust.
  • Salt Security's recent investigation exposed several critical security flaws within the OAuth implementations of popular ChatGPT plug-ins .
  • Salt Security's OAuth Protection Package provides robust OAuth defenses that help organizations achieve several critical security objectives.