Veza integrates with Google Drive to secure access to enterprise files

Veza announced an integration with Google Drive, the popular file storage and synchronization service. With this integration, Veza customers can now secure access to files like docs and spreadsheets... Read more »

Free ransomware recovery tool White Phoenix now has a web version

White Phoenix is a free ransomware recovery tool for situations where files are encrypted with intermittent encryption. It was tested on BlackCat/ALPHV Ransomware, Play Ransomware, Qilin/Agenda Ransomware, BianLian Ransomware,... Read more »

Does CVSS 4.0 solve the exploitability problem?

The newest version of the vulnerability scoring system CVSS 4.0 is here! After a lengthy gap between version 3 (released in 2015), as of November 2023 version 4.0 is... Read more »

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management

In this Help Net Security interview, Stephanie Hagopian, VP of Security at CDW, discusses offensive strategies in the face of complex cyberattacks and the role of the zero-trust model.... Read more »

How to make developers accept DevSecOps

According to a recent Dynatrace report, only 50% of CISOs believe that development teams have thoroughly tested the software for vulnerabilities before deploying it into the production environment. This... Read more »

Cybercriminals replace familiar tactics to exfiltrate sensitive data

Ransomware attacks are increasing again as cybercriminals’ motivation shifts to data exfiltration, according to Delinea. The familiar tactics of crippling a company and holding it hostage have been replaced... Read more »

Database management enters a new era of complexity

Increasing complexity, the rapid adoption of emerging technologies and a growing skills gap are the biggest concerns facing IT leaders in 2024, according to Redgate. 30% of development teams... Read more »

SentinelOne unveils threat hunting capabilities in its WatchTower and WatchTower Pro

Organizations today face a relentless pace of sophisticated cyber attacks that they must be able to swiftly detect and neutralize to keep their assets and infrastructure safe. But many... Read more »

Siren launches AI-Powered search with mobile access for front line officers

Siren has launched a new AI-Powered search with mobile access as part of its latest release and its Siren for Law Enforcement product bundle. Siren provides a complete suite... Read more »

NordVPN Link Checker protects users from malicious websites

NordVPN launches its new experimental product from the NordLabs platform. Link Checker is a manual URL-checking tool that enables users to examine a website’s safety before visiting by scanning... Read more »
Subscribe to our Newsletter