Netscout expands network observability for the digital edge

Read more »

How to Protect Privacy and Build Secure AI Products

AI systems are transforming technology and driving innovation across industries. How to protect privacy and build secure AI products? How to Protect Privacy and Build Secure AI Products AI... Read more »

Waterfall Security HERA secures OT environments

Waterfall Security launched HERA – Hardware Enforced Remote Access, a new technology designed to enable safe and secure remote access into cyber-physical systems and OT networks. HERA allows organizations... Read more »

NETSCOUT delivers IT observability for remote locations at the digital edge

NETSCOUT introduced its new suite of Business Edge Observability products, including the nGenius Edge Sensor and Remote InfiniStreamNG solutions to deliver IT observability for remote locations at the digital... Read more »

Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)

Cisco has fixed two critical vulnerabilities that may allow attackers to overwrite files on its Secure Email Gateways (CVE-2024-20401) and change the password of any user on its Smart... Read more »

NDAY Security ATTACKN identifies critical exploitable security vulnerabilities

NDAY Security unveiled the latest release to its automated offensive security platform, ATTACKN. This all-in-one platform enables organizations to deploy, monitor, and manage critical offensive security measures, including: Point-in-time... Read more »

AppViewX PQC Test Center helps organizations prepare and achieve PQC resiliency

AppViewX announced the AppViewX PQC Test Center, which allows organizations to assess their PQC readiness and take steps to achieve PQC resiliency. This free online service enables users to... Read more »

Fighting AI-powered synthetic ID fraud with AI

Aided by the emergence of generative artificial intelligence models, synthetic identity fraud has skyrocketed, and now accounts for a staggering 85% of all identity fraud cases. For security professionals,... Read more »

Laying the groundwork for zero trust in the military

In this Help Net Security interview, Curtis Arnold, VP and Chief Scientist at Core4ce, discusses the starting points for military training in zero trust principles, emphasizing foundational technologies and... Read more »

Grype: Open-source vulnerability scanner for container images, filesystems

Grype is an open-source vulnerability scanner designed for container images and filesystems that seamlessly integrates with Syft, a powerful Software Bill of Materials (SBOM) tool. Find vulnerabilities for major... Read more »
Subscribe to our Newsletter