Datadog App Builder helps accelerate issue remediation

Datadog launched Datadog App Builder, a low-code development tool that helps teams create self-service applications and integrate them securely into their monitoring stacks. These customized apps help accelerate issue... Read more »

How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams

Cybersecurity isn’t just about firewalls and antivirus. It’s about understanding how your defenses, people, and processes work together. Just like Google Maps revolutionized navigation, process mapping can revolutionize how... Read more »

Enhancing security through collaboration with the open-source community

In this Help Net Security interview, Alan DeKok, CEO at NetworkRADIUS, discusses the need for due diligence in selecting and maintaining open-source tools, and brings out the potential risks... Read more »

Mass exploitation is the new primary attack vector for ransomware

The cyber threat landscape in 2023 and 2024 has been dominated by mass exploitation, according to WithSecure. Edge service KEV vulnerability trends 64% of all edge service and infrastructure... Read more »

Preparing for a post-quantum future

Post-quantum cryptography (PQC) is a hot topic. A recent paper from Tsinghua University raised doubts about lattice-based cryptography for PQC, though an error was found. This has sparked questions... Read more »

42% plan to use API security for AI data protection

While 75% of enterprises are implementing AI, 72% report significant data quality issues and an inability to scale data practices, according to F5. Data and the systems companies put... Read more »

Metomic’s Google User Groups feature alerts users when sensitive data might be at risk

Metomic launched its new integration with Google Groups. The feature enables IT and security teams to ensure data loss prevention (DLP) across all business units that leverage Google Groups,... Read more »

Malware peddlers love this one social engineering trick!

Attackers are increasingly using a clever social engineering technique to get users to install malware, Proofpoint researchers are warning. The message warns of a problem but also offers a... Read more »

Argus Cyber Security and Microsoft partner to secure automotive fleets throughout the vehicle lifecycle

Argus Cyber Security is collaborating with Microsoft to build a next generation, end-to-end platform for automotive and mobility security. This Argus Vehicle Security Platform consists of two integrated solutions... Read more »

Low code, high stakes: Addressing SQL injection

Like a bad movie that seems to go on forever, SQL injection (SQLi) attacks have lingered since the late 1990s. Due to various factors, they remain the third most... Read more »
Subscribe to our Newsletter