Veza Access AuthZ automates identity governance

Veza announced Access AuthZ, a new product that automates how organizations grant and revoke access across enterprise systems to address the “last mile” of identity governance. Built on the... Read more »

PortGPT: How researchers taught an AI to backport security patches automatically

Keeping older software versions secure often means backporting patches from newer releases. It is a routine but tedious job, especially for large open-source projects such as the Linux kernel.... Read more »

New Relic unveils Logs Intelligence to accelerate root cause analysis with AI

New Relic has announced Logs Intelligence, a series of AI-strengthened capabilities that automate the time and effort required to reduce mean time to resolution (MTTR) and extract critical insights... Read more »

AI can flag the risk, but only humans can close the loop

In this Help Net Security interview, Dilek Çilingir, Global Forensic & Integrity Services Leader at EY, discusses how AI is transforming third-party assessments and due diligence. She explains how... Read more »

VulnRisk: Open-source vulnerability risk assessment platform

VulnRisk is an open-source platform for vulnerability risk assessment. It goes beyond basic CVSS scoring by adding context-aware analysis that reduces noise and highlights what matters. The tool is... Read more »

Connected homes: Is bystander privacy anyone’s responsibility?

Smart doorbells, connected cameras, and home monitoring systems have become common sights on doorsteps and living rooms. They promise safety and convenience, but they also raise a problem. These... Read more »

Google says 2026 will be the year AI supercharges cybercrime

Security leaders are staring down a year of major change. In its Cybersecurity Forecast 2026, Google paints a picture of a threat landscape transformed by AI, supercharged cybercrime, and... Read more »

Delinea Platform now available to IBM customers through expanded partnership

Delinea has announced the expansion of its OEM agreement with IBM to make the full Delinea Platform available to IBM customers. This new agreement deepens a strategic collaboration that... Read more »

Cybercriminals exploit RMM tools to steal real-world cargo

Cybercriminals are compromising logistics and trucking companies by tricking them into installing remote monitoring and management (RMM) tools, Proofpoint researchers warned. The attackers’ end goal is to hijack freight... Read more »

DefectDojo unveils Sensei, an AI-powered cybersecurity consultant

DefectDojo has announced DefectDojo Sensei, an AI agent designed to serve as the ultimate cybersecurity consultant. Sensei is the first super-intelligent agent of its kind in cybersecurity, leveraging self-training... Read more »
Subscribe to our Newsletter