Emerging Tech Connect
Emerging Tech Connect
  • Home
  • Technologies
    • Artificial Intelligence
    • Cloud Computing
    • Cyber Security
  • Services
    • Staffing
  • Contact
  • More
    • Home
    • Technologies
      • Artificial Intelligence
      • Cloud Computing
      • Cyber Security
    • Services
      • Staffing
    • Contact
  • Home
  • Technologies
    • Artificial Intelligence
    • Cloud Computing
    • Cyber Security
  • Services
    • Staffing
  • Contact

Stay updated on Cyber Security Tech with Emerging Tech Connect

Cyber security technology highlights of the week

Week of 19-May-25

Week of 19-May-25

Week of 19-May-25

- Advanced data sovereignty controls on Google Cloud


- Microsoft Entra Agent ID to extend Zero Trust security principles to AI agents


- Veeam unveiled Kasten enhancing data resilience for Kubernetes environments


- Fortra Protect new global partner program

Download

Week of 12-May-25

Week of 19-May-25

Week of 19-May-25

- Enhanced Tenable One platform


- Fortra acquires Lookout Cloud Security enhancing DSPM capabilities


- Orca Security acquires Opus to enhance its CNAPP platform


- CrowdStrike’s Falcon ZTA for iOS and Android devices


- Google introduced Device Trust from Android Enterprise

Download

Week of 5-May-25

Week of 19-May-25

Week of 28-Apr-25

- Fortinet introduced FortiGate 700G to strengthen hybrid mesh firewall


- OneTrust’s new Data Governance Solution for AI ready data


- CrowdStrike extends its Falcon Platform to VMware environments

Download

Week of 28-Apr-25

Week of 28-Apr-25

Week of 28-Apr-25

- Palo Alto Networks launched Cortex XSIAM 3.0 AI-driven SecOps platform


- Rapid7 enhances Command Platform with unified threat-informed remediation


- CrowdStrike’s Agentic AI innovations


- IBM enhances its MDR services with Agentic AI capabilities


- Cisco’s AI-driven security innovations


- NVIDIA’s DOCA Argus cybersecurity solution framework


- Meta introduced new LLaMA protection tools

Download

Week of 21-Apr-25

Week of 28-Apr-25

Week of 21-Apr-25

- From Fortinet Accelerate25 in Berlin


- OneTrust unveils new AI agents and automation capabilities


- Rapid7 introduced MDR for Enterprise


- Darktrace enhances its NDR capabilities


- Veeam’s Data Resilience Maturity Model


- Snyk launched next-generation DAST solution


- CrowdStrike launched Falcon Privileged Access solution

Download

Week of 14-Apr-25

Week of 28-Apr-25

Week of 21-Apr-25

- Darktrace enhances Cyber AI Analyst with new AI capabilities


- CrowdStrike enhanced its Falcon Cloud Security platform for AWS Security


- Cyware adds Compromised Credential Management to its Threat Solution


- Entrust launched unified Cryptographic Security Platform

Download

Hot on Cyber Security Technology

AI in Cybersecurity: Enhancing Threat Detection and Response

Cloud Security: Advanced protection for hybrid and multi-cloud environments

Cloud Security: Advanced protection for hybrid and multi-cloud environments

Learn More

Cloud Security: Advanced protection for hybrid and multi-cloud environments

Cloud Security: Advanced protection for hybrid and multi-cloud environments

Cloud Security: Advanced protection for hybrid and multi-cloud environments

Learn More

Zero Trust Security: Continuous verification of all users and devices

Cloud Security: Advanced protection for hybrid and multi-cloud environments

Zero Trust Security: Continuous verification of all users and devices

Learn More

Extended Detection and Response (XDR)

Endpoint Detection and Response (EDR): Monitoring and Securing Endpoint Devices

Zero Trust Security: Continuous verification of all users and devices

Learn More

Endpoint Detection and Response (EDR): Monitoring and Securing Endpoint Devices

Endpoint Detection and Response (EDR): Monitoring and Securing Endpoint Devices

Endpoint Detection and Response (EDR): Monitoring and Securing Endpoint Devices

Learn More

Secure Access Service Edge (SASE)

Endpoint Detection and Response (EDR): Monitoring and Securing Endpoint Devices

Endpoint Detection and Response (EDR): Monitoring and Securing Endpoint Devices

Learn More

Blockchain Security: Ensuring secure transactions and data integrity

Quantum-Resistant Cryptography: Developing encryption against quantum attacks

Quantum-Resistant Cryptography: Developing encryption against quantum attacks

Learn More

Quantum-Resistant Cryptography: Developing encryption against quantum attacks

Quantum-Resistant Cryptography: Developing encryption against quantum attacks

Quantum-Resistant Cryptography: Developing encryption against quantum attacks

Learn More

IoT Security: Protecting Internet of Things Devices

Quantum-Resistant Cryptography: Developing encryption against quantum attacks

IoT Security: Protecting Internet of Things Devices

Learn More

Subscribe

Sign up to get our updates

Emerging Tech Connect Private Limited - All Rights Reserved. Disclaimer

Powered by