Topic: attack surface reduction

  • Bitdefender Launches Standalone PHASR for Proactive Endpoint Security

    Bitdefender Launches Standalone PHASR for Proactive Endpoint Security

    Bitdefender has launched GravityZone PHASR as a standalone solution, enabling businesses to add advanced pre-emptive protection to their existing security systems without replacing them. PHASR merges behavior-based security hardening with live threat intelligence to proactively block ransomware a...

    Read More »
  • Silent After a Hack? Why Firms' Silence Puts You at Risk

    Silent After a Hack? Why Firms' Silence Puts You at Risk

    Cyber threats are shifting toward stolen credentials and built-in system tools, requiring proactive security measures as traditional perimeter defenses become ineffective. Organizations are prioritizing attack surface reduction by eliminating unnecessary tools and permissions, while hackers incre...

    Read More »
  • Your Own Tools Are Being Weaponized: Here's How to Fight Back

    Your Own Tools Are Being Weaponized: Here's How to Fight Back

    SMEs often neglect cybersecurity, creating vulnerabilities as new threats specifically target the everyday tools businesses rely on, bypassing traditional security measures. A major emerging threat is "living-off-the-land" (LOTL) attacks, where hackers misuse trusted system utilities like PowerSh...

    Read More »
  • Sprout: The Fast, Secure Open-Source Bootloader

    Sprout: The Fast, Secure Open-Source Bootloader

    Sprout is an open-source bootloader that achieves sub-second boot times, launching a Linux system in under 50 milliseconds, ideal for cloud computing and rapid deployments. Built entirely in Rust, Sprout enhances security by avoiding memory-related vulnerabilities, establishing a memory-safe chai...

    Read More »
  • RadiantOne Adds Composable Remediation and Unified Identity Observability

    RadiantOne Adds Composable Remediation and Unified Identity Observability

    The RadiantOne Platform introduces AI-powered collaborative remediation and a unified observability layer, shifting identity management from reactive monitoring to proactive, continuous posture control to strengthen Zero Trust architectures. A core innovation is an AI Data Assistant (AIDA) that f...

    Read More »
  • Secure Active Directory with UserLock IAM: Product Showcase

    Secure Active Directory with UserLock IAM: Product Showcase

    UserLock is a modern IAM layer for Microsoft Active Directory that enhances security with granular MFA, contextual access rules, and real-time session monitoring without requiring a disruptive identity overhaul. It provides comprehensive visibility and control by aggregating AD entities into dash...

    Read More »
  • Docker Hardened Images: Now Affordable for Small Businesses

    Docker Hardened Images: Now Affordable for Small Businesses

    Docker now offers unlimited access to its Hardened Images catalog through an affordable subscription, making secure, vulnerability-checked container images accessible to startups and small businesses with a 30-day free trial. These images are built from source code, stripped of non-essential comp...

    Read More »