Bitdefender releases GravityZone Cloud MSP Security Solutions

Bitdefender launched GravityZone Cloud MSP Security Solutions, a new offering designed specifically for managed service providers (MSPs) and their business customers that delivers endpoint protection and managed detection and... Read more »

Axonius secures $200 million to scale its global reach and product innovation

Axonius announced it has secured $200 million in a Series E extension funding round led by Accel and Lightspeed Venture Partners. Stripes also participated. This new round of funding... Read more »

Delinea Privilege Control for Servers enforces least privilege principles on critical systems

Delinea announced the introduction of Privilege Control for Servers on the Delinea Platform, enforcing least privilege principles on critical systems consistently across identities to combat stolen credentials and restrict... Read more »

NetApp cyber-resiliency capabilities protect both primary and secondary data

NetApp announced cyber-resiliency capabilities that will equip customers to better protect and recover their data in the face of ransomware threats. NetApp integrates artificial intelligence (AI) and machine learning... Read more »

Okta FGA enables developers to define authorization in a way that best fits their business

Okta announced Fine Grained Authorization (FGA) to address authorization complexities for developers. FGA allows developers to design authorization models in a way that’s centralized, flexible, scalable, and easy to... Read more »

Hundreds of orgs targeted with emails aimed at stealing NTLM authentication hashes

A threat actor specializing in establishing initial access to target organizations’ computer systems and networks is using booby-trapped email attachments to steal employees’ NTLM hashes. Why are they after... Read more »

Why cyber maturity assessment should become standard practice

Understanding risk is one thing, but how do you know if your organization has what it takes to withstand those risks being realized? Establishing cyber maturity can help determine... Read more »

3 free data protection regulation courses you can take right now

Increasingly, information about us, and even by us, is being processed. Even mundane or insignificant details can be combined and linked with other data in a manner that may... Read more »

Secure your hybrid workforce: The advantages of encrypted storage

In this Help Net Security video, Ryan Amparo, Field Application Engineer at Kingston Technology, discusses the benefits of encrypted external SSDs and USBs for hybrid workforces. He talks about... Read more »

What organizations need to know about the Digital Operational Resilience Act (DORA)

In this Help Net Security interview, Kris Lovejoy, Global Security and Resilience Leader at Kyndryl, discusses the impact of the Digital Operational Resilience Act (DORA) on organizations across the... Read more »
Subscribe to our Newsletter