05-07-2024, 11:05 AM
News Top 5 Cybersecurity Companies Making Waves at RSAC 2024
<p><img width="1170" height="748" src="https://thecyberexpress.com/wp-content/uploads/RSAC-2024.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="RSAC 2024" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/RSAC-2024.webp 1170w, https://thecyberexpress.com/wp-content/u...0x192.webp 300w, https://thecyberexpress.com/wp-content/u...4x655.webp 1024w, https://thecyberexpress.com/wp-content/u...8x491.webp 768w, https://thecyberexpress.com/wp-content/u...0x384.webp 600w, https://thecyberexpress.com/wp-content/u...50x96.webp 150w, https://thecyberexpress.com/wp-content/u...0x479.webp 750w, https://thecyberexpress.com/wp-content/u...0x729.webp 1140w" sizes="(max-width: 1170px) 100vw, 1170px" /></p><span data-contrast="none">The RSA Conference 2024, the world's biggest cybersecurity event, is currently underway at the Moscone Center in San Francisco. Over 640 vendors are showcasing their latest offerings at the expo, which began on Monday, May 6, 2024 and runs until Thursday, May 9th. </span>
<span data-contrast="none">For the second consecutive year, generative AI (GenAI) appears to be a major focus for cybersecurity products unveiled at the event. Here's a look at the top 5 companies making a splash at RSAC 2024:</span>
<h3><b><span data-contrast="none">1. <a href="https://cyble.com/" target="_blank" rel="noopener">Cyble</a> with <a href="https://cyble.com/products/cyble-vision/" target="_blank" rel="noopener">Vision X</a></span></b></h3>
<span data-contrast="none">Cyble, a prominent force in AI-powered <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-cybersecurity/" target="_blank" rel="noopener" title="cybersecurity" data-wpil-keyword-link="linked" data-wpil-monitor-id="3351">cybersecurity</a>, has launched Cyble Vision X, the successor to its award-winning Cyble Vision 2.0 threat intelligence platform. Vision X aims to elevate the user experience by granting decision-makers immediate access to critical information. </span>
<span data-contrast="none">The first phase of Vision X is poised to introduce a series of impactful enhancements, including a revamped "Executive Insights" dashboard that consolidates the most significant intelligence in a user-friendly interface.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":240,"335559739":240,"335559740":420}"> </span>
<span data-contrast="none">Additionally, an improved filter allows users to effortlessly navigate through their <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/" target="_blank" rel="noopener" title="data" data-wpil-keyword-link="linked" data-wpil-monitor-id="3347">data</a>, and a sleeker, more modern, and intuitive design ensures an optimized user experience. Cyble Vision X also boasts several other improvements, such as:</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":240,"335559739":240,"335559740":420}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">A new "Alerts Insights" interface, previously known as "Executive Insights" and rebranded to reflect a more granular level of data analysis.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":420}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">A revamped header and collapsible left pane for a cleaner, more efficient workspace.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":420}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">A redesigned authentication screen that maintains the same API functionality while incorporating aesthetic enhancements.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":420}"> </span></li>
</ul>
<span data-contrast="none">For more information, visit Cyble's booth N-2353 at RSA to explore VisionX and their other services.</span>
<h3><b><span data-contrast="none">2. <a href="https://theori.io/" target="_blank" rel="noopener">Theori</a> with <a href="https://theori.io/service/infra#xint" target="_blank" rel="noopener">Xint</a></span></b></h3>
<span data-contrast="none">Taking a unified approach, Theori unveiled Xint, a comprehensive <a class="wpil_keyword_link" href="https://thecyberexpress.com/" target="_blank" rel="noopener" title="Security" data-wpil-keyword-link="linked" data-wpil-monitor-id="3349">Security</a> Posture Management (SPM) solution. Xint streamlines security operations by consolidating data from various sources, enabling organisations to gain a holistic view of their security posture and proactively identify <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/" target="_blank" rel="noopener" title="vulnerabilities" data-wpil-keyword-link="linked" data-wpil-monitor-id="3348">vulnerabilities</a>.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":240,"335559739":240,"335559740":420}"> </span>
<span data-contrast="none">Highlights of Xint include:</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":240,"335559739":240,"335559740":420}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="none">Cloud Security: Continuous monitoring and enhanced visibility into cloud configurations, resource utilization, and access controls to swiftly respond to potential security <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/" target="_blank" rel="noopener" title="risks" data-wpil-keyword-link="linked" data-wpil-monitor-id="3350">risks</a>.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":420}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="none">External Threat Detection: Security tools designed to defend against unauthorized access for externally facing applications, including web applications, APIs, mobile apps, and third-party integrations.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":420}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1"><span data-contrast="none">Offensive Security AI Engine: A revolutionary approach to penetration testing that combines the expertise of award-winning offensive cybersecurity veterans with cutting-edge artificial intelligence technology that precisely pinpoints vulnerabilities.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":420}"> </span></li>
</ul>
For more information, visit Theori's Booth: 634.
<h3><b><span data-contrast="none">3. New <a href="https://www.seic.com/" target="_blank" rel="noopener">SEI</a> Tool</span></b></h3>
<span data-contrast="none">The Software Engineering Institute (SEI) introduced a novel tool designed to provide much-needed visibility into DevSecOps pipelines. This tool empowers developers to identify and address security issues early in the development process, preventing them from becoming exploitable vulnerabilities in the final product.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":240,"335559739":240,"335559740":420}"> </span>
<span data-contrast="none">The tool, called Polar, is an observability framework that provides a comprehensive picture of a software system's deployment platform. </span>
<span data-contrast="none">Polar unlocks data captured by disparate tools within an organization, helping to answer complex questions about performance and security that are crucial for real-time decision-making and agility in the face of threats.</span>
For more information, visit SEI's Booth: 1743.
<h3><b><span data-contrast="none">4. <a href="https://www.cranium.ai/" target="_blank" rel="noopener">Cranium</a> with First-of-its-Kind GenAI Exposure Management Solution</span></b></h3>
<span data-contrast="none">Cranium, a leading enterprise AI security and trust software firm, introduced the industry's first exposure management solution specifically designed for GenAI at RSAC 2024. </span>
<span data-contrast="none">The Cranium platform features an AI-augmented workflow with a secure LLM architecture paired with proprietary threat intelligence to provide visibility into an AI system, characterize attack surfaces, and assess vulnerabilities within an organization.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":240,"335559739":240,"335559740":420}"> </span>
<span data-contrast="none">As the use of GenAI tools like Microsoft's Copilot for Microsoft 365 grows, concerns around potential misuse and exploitation also rise. Cranium's solution offers a critical layer of protection against such attacks. </span>
<span data-contrast="none">Their exposure management solution can help organizations identify and mitigate potential security risks associated with GenAI tools, ensuring these powerful AI-driven applications are used securely.</span>
<h3><b><span data-contrast="none">5. <a href="https://www.vectra.ai/" target="_blank" rel="noopener">Vectra AI</a> Expands Platform to Combat GenAI Attacks</span></b></h3>
<span data-contrast="none">Vectra AI, a leader in hybrid attack detection, investigation, and response, has recognized the evolving threat landscape with the rise of GenAI and has expanded its AI platform to combat GenAI attacks. </span>
<span data-contrast="none">Vectra's enhanced solution leverages advanced AI and machine learning to detect and neutralize sophisticated attacks that may exploit the capabilities of GenAI tools. Traditional security solutions might struggle to identify these novel attack methods, so Vectra's AI-powered platform offers a vital line of defense.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":240,"335559739":240,"335559740":420}"> </span>
Catch up with our team at our open house, Attack Labs Live, at the Nthanksaq Entrepreneurial Center
https://thecyberexpress.com/top-5-cybers...rsac-2024/
<p><img width="1170" height="748" src="https://thecyberexpress.com/wp-content/uploads/RSAC-2024.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="RSAC 2024" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/RSAC-2024.webp 1170w, https://thecyberexpress.com/wp-content/u...0x192.webp 300w, https://thecyberexpress.com/wp-content/u...4x655.webp 1024w, https://thecyberexpress.com/wp-content/u...8x491.webp 768w, https://thecyberexpress.com/wp-content/u...0x384.webp 600w, https://thecyberexpress.com/wp-content/u...50x96.webp 150w, https://thecyberexpress.com/wp-content/u...0x479.webp 750w, https://thecyberexpress.com/wp-content/u...0x729.webp 1140w" sizes="(max-width: 1170px) 100vw, 1170px" /></p><span data-contrast="none">The RSA Conference 2024, the world's biggest cybersecurity event, is currently underway at the Moscone Center in San Francisco. Over 640 vendors are showcasing their latest offerings at the expo, which began on Monday, May 6, 2024 and runs until Thursday, May 9th. </span>
<span data-contrast="none">For the second consecutive year, generative AI (GenAI) appears to be a major focus for cybersecurity products unveiled at the event. Here's a look at the top 5 companies making a splash at RSAC 2024:</span>
<h3><b><span data-contrast="none">1. <a href="https://cyble.com/" target="_blank" rel="noopener">Cyble</a> with <a href="https://cyble.com/products/cyble-vision/" target="_blank" rel="noopener">Vision X</a></span></b></h3>
<span data-contrast="none">Cyble, a prominent force in AI-powered <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-cybersecurity/" target="_blank" rel="noopener" title="cybersecurity" data-wpil-keyword-link="linked" data-wpil-monitor-id="3351">cybersecurity</a>, has launched Cyble Vision X, the successor to its award-winning Cyble Vision 2.0 threat intelligence platform. Vision X aims to elevate the user experience by granting decision-makers immediate access to critical information. </span>
<span data-contrast="none">The first phase of Vision X is poised to introduce a series of impactful enhancements, including a revamped "Executive Insights" dashboard that consolidates the most significant intelligence in a user-friendly interface.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":240,"335559739":240,"335559740":420}"> </span>
<span data-contrast="none">Additionally, an improved filter allows users to effortlessly navigate through their <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/" target="_blank" rel="noopener" title="data" data-wpil-keyword-link="linked" data-wpil-monitor-id="3347">data</a>, and a sleeker, more modern, and intuitive design ensures an optimized user experience. Cyble Vision X also boasts several other improvements, such as:</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":240,"335559739":240,"335559740":420}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="none">A new "Alerts Insights" interface, previously known as "Executive Insights" and rebranded to reflect a more granular level of data analysis.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":420}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">A revamped header and collapsible left pane for a cleaner, more efficient workspace.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":420}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">A redesigned authentication screen that maintains the same API functionality while incorporating aesthetic enhancements.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":420}"> </span></li>
</ul>
<span data-contrast="none">For more information, visit Cyble's booth N-2353 at RSA to explore VisionX and their other services.</span>
<h3><b><span data-contrast="none">2. <a href="https://theori.io/" target="_blank" rel="noopener">Theori</a> with <a href="https://theori.io/service/infra#xint" target="_blank" rel="noopener">Xint</a></span></b></h3>
<span data-contrast="none">Taking a unified approach, Theori unveiled Xint, a comprehensive <a class="wpil_keyword_link" href="https://thecyberexpress.com/" target="_blank" rel="noopener" title="Security" data-wpil-keyword-link="linked" data-wpil-monitor-id="3349">Security</a> Posture Management (SPM) solution. Xint streamlines security operations by consolidating data from various sources, enabling organisations to gain a holistic view of their security posture and proactively identify <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-vulnerabilities/" target="_blank" rel="noopener" title="vulnerabilities" data-wpil-keyword-link="linked" data-wpil-monitor-id="3348">vulnerabilities</a>.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":240,"335559739":240,"335559740":420}"> </span>
<span data-contrast="none">Highlights of Xint include:</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":240,"335559739":240,"335559740":420}"> </span>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="none">Cloud Security: Continuous monitoring and enhanced visibility into cloud configurations, resource utilization, and access controls to swiftly respond to potential security <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-are-risks-in-cybersecurity/" target="_blank" rel="noopener" title="risks" data-wpil-keyword-link="linked" data-wpil-monitor-id="3350">risks</a>.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":420}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="none">External Threat Detection: Security tools designed to defend against unauthorized access for externally facing applications, including web applications, APIs, mobile apps, and third-party integrations.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":420}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1"><span data-contrast="none">Offensive Security AI Engine: A revolutionary approach to penetration testing that combines the expertise of award-winning offensive cybersecurity veterans with cutting-edge artificial intelligence technology that precisely pinpoints vulnerabilities.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":0,"335559739":0,"335559740":420}"> </span></li>
</ul>
For more information, visit Theori's Booth: 634.
<h3><b><span data-contrast="none">3. New <a href="https://www.seic.com/" target="_blank" rel="noopener">SEI</a> Tool</span></b></h3>
<span data-contrast="none">The Software Engineering Institute (SEI) introduced a novel tool designed to provide much-needed visibility into DevSecOps pipelines. This tool empowers developers to identify and address security issues early in the development process, preventing them from becoming exploitable vulnerabilities in the final product.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":240,"335559739":240,"335559740":420}"> </span>
<span data-contrast="none">The tool, called Polar, is an observability framework that provides a comprehensive picture of a software system's deployment platform. </span>
<span data-contrast="none">Polar unlocks data captured by disparate tools within an organization, helping to answer complex questions about performance and security that are crucial for real-time decision-making and agility in the face of threats.</span>
For more information, visit SEI's Booth: 1743.
<h3><b><span data-contrast="none">4. <a href="https://www.cranium.ai/" target="_blank" rel="noopener">Cranium</a> with First-of-its-Kind GenAI Exposure Management Solution</span></b></h3>
<span data-contrast="none">Cranium, a leading enterprise AI security and trust software firm, introduced the industry's first exposure management solution specifically designed for GenAI at RSAC 2024. </span>
<span data-contrast="none">The Cranium platform features an AI-augmented workflow with a secure LLM architecture paired with proprietary threat intelligence to provide visibility into an AI system, characterize attack surfaces, and assess vulnerabilities within an organization.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":240,"335559739":240,"335559740":420}"> </span>
<span data-contrast="none">As the use of GenAI tools like Microsoft's Copilot for Microsoft 365 grows, concerns around potential misuse and exploitation also rise. Cranium's solution offers a critical layer of protection against such attacks. </span>
<span data-contrast="none">Their exposure management solution can help organizations identify and mitigate potential security risks associated with GenAI tools, ensuring these powerful AI-driven applications are used securely.</span>
<h3><b><span data-contrast="none">5. <a href="https://www.vectra.ai/" target="_blank" rel="noopener">Vectra AI</a> Expands Platform to Combat GenAI Attacks</span></b></h3>
<span data-contrast="none">Vectra AI, a leader in hybrid attack detection, investigation, and response, has recognized the evolving threat landscape with the rise of GenAI and has expanded its AI platform to combat GenAI attacks. </span>
<span data-contrast="none">Vectra's enhanced solution leverages advanced AI and machine learning to detect and neutralize sophisticated attacks that may exploit the capabilities of GenAI tools. Traditional security solutions might struggle to identify these novel attack methods, so Vectra's AI-powered platform offers a vital line of defense.</span><span data-ccp-props="{"134233117":false,"134233118":false,"201341983":0,"335559738":240,"335559739":240,"335559740":420}"> </span>
Catch up with our team at our open house, Attack Labs Live, at the Nthanksaq Entrepreneurial Center
https://thecyberexpress.com/top-5-cybers...rsac-2024/