Topic: asset discovery
-
Cyber Theory vs. Practice: Are Your Tools Failing You?
Traditional security measures often fail due to inaccurate data and manual processes, leaving organizations vulnerable as they operate with flawed information. Many organizations face critical weaknesses in asset discovery, vulnerability management, threat intelligence, and endpoint enforcement, ...
Read More » -
Forescout eyeSentry: Continuous Cloud Exposure Management
Forescout launched eyeSentry, a cloud-native platform that helps enterprises identify and manage vulnerabilities across IT, IoT, and IoMT assets, addressing the limitations of traditional security measures in modern networks. A study by Forescout reveals that 65% of connected assets in organizati...
Read More » -
Top Cybersecurity Products Launched This Week: October 2025
OPSWAT's MetaDefender Drive offers a portable, network-free threat scanner for securely validating temporary devices before they access protected networks. Radiflow360 integrates operational technology risk management, compliance, and incident response into a unified platform for mid-sized indust...
Read More » -
ImmuniWeb Boosts AI-Powered Security Testing & Compliance
ImmuniWeb's Q4 update focuses on identifying AI-specific vulnerabilities, including the OWASP Top 10 for LLMs, and expands capabilities for detecting exposed AI infrastructure and shadow IT assets. The platform enhances compliance testing for regulations like EU DORA, introduces new reporting fea...
Read More » -
Zscaler Buys SPLX to Secure AI Investments
Zscaler has acquired SPLX to enhance its Zero Trust Exchange platform with advanced AI security capabilities, including asset discovery, automated red teaming, and governance tools. The integration addresses the urgent need to secure the entire AI lifecycle, protecting sensitive data like prompts...
Read More » -
Bitdefender GravityZone EASM Lowers Cyber Threat Risks
Bitdefender launched GravityZone External Attack Surface Management (EASM) to help organizations gain visibility into internet-connected assets and vulnerabilities, addressing complex IT security challenges. The solution proactively scans and analyzes external digital assets without endpoint inst...
Read More »