Permit Share-If enables developers to implement secure collaboration features into their apps

Secure collaboration through access-sharing is a must-have feature in almost any modern application, from requesting to edit a document or viewing a widget in a dashboard to submitting wire... Read more »

GitGuardianā€™s tool helps companies discover developer leaks on GitHub

GitGuardian releases a tool to help companies discover how many secrets their developers have leaked on public GitHub, both company-related and personal. Even if your organization doesn’t engage in... Read more »

CrowdStrike chaos: Enterprises urged to take protective action in wake of botched software update

Read more »

Cybersecurity ROI: Top metrics and KPIs

In this Help Net Security interview, Karthik Swarnam, Chief Security and Trust Officer at ArmorCode, discusses key metrics and KPIs to measure cybersecurity ROI. Swarnam shares strategies for enhancing... Read more »

WhatsApp and Signal messages at risk of surveillance following EncroChat ruling, court hears

Read more »

Infisical: Open-source secret management platform

Infisical is an open-source secret management platform developers use to centralize application configurations and secrets, such as API keys and database credentials, while also managing their internal PKI. In... Read more »

Cybersecurity jobs available right now: July 24, 2024

Applied Cryptographer Quantstamp | EMEA | Remote – View job details As an Applied Cryptographer, you will research about various cryptographic protocols and have knowledge of cryptographic primitives or... Read more »

AI accelerates code development faster than security teams can keep up

91% of respondents say their security budget is increasing this year, demonstrating a growing recognition of the importance of cybersecurity within organizations, according to Seemplicity. Vendor environments introduce complexity... Read more »

FrostyGoop ICS malware targets Ukraine

In April 2024, Dragos researchers spotted the malware FrostyGoop that interacts with Industrial Control Systems (ICS) using the Modbus protocol. In April 2024, Dragos researchers discovered a new ICS... Read more »

NCA seizes thousands of social media accounts used by people smugglers

Read more »
Subscribe to our Newsletter