Verimatrix introduced Verimatrix XTD Accessibility Abuse Detector service that builds upon its ongoing successful discoveries of notable Android security threats and provides much-needed GDPR protections. Verimatrix XTD and its... Read more »
Appdome released a new mobile SDK protection and mobile threat streaming service, called Appdome SDKProtect. Appdome SDKProtect is designed to end third-party, mobile supply chain risk and democratize mobile... Read more »
N2WS has introduced several new features to its cloud-native backup and disaster recovery (BDR) platform to help enterprises and managed service providers (MSPs) with combatting the increasing number of... Read more »
The education system isn’t equipped to handle today’s cyberthreats. I’m not just talking about cybersecurity education in schools shaping the technical workforce of the future – America’s schools themselves... Read more »
In this Help Net Security interview, Jenn Markey, Advisor to The Entrust Cybersecurity Institute, discusses the increasing adoption of enterprise-wide zero trust strategies in response to evolving cyber threats.... Read more »
Corporate Data Protection Manager GLS | Germany | Hybrid – View job details As a Corporate Data Protection Manager, you will develop the Corporate Data Protection Framework with a... Read more »
This article includes excerpts from various reports that offer statistics and insights into the current cyber threat landscape. Human error still perceived as the Achilles’ heel of cybersecurity Proofpoint... Read more »
LOKKER released Consent Verification, a new tool in LOKKER’s Privacy Edge Platform that gives businesses a simple way to check whether their consent banners are properly configured and working... Read more »
Veeam Software introduced Veeam Data Cloud Vault, a cloud-based storage service that enables users to securely store backup data not only off-site, but in an always-immutable and encrypted format,... Read more »
Security researchers have published a proof-of-concept (PoC) exploit that chains together two vulnerabilities (CVE-2024-4358, CVE-2024-1800) to achieve unauthenticated remote code execution on Progress Telerik Report Servers. Telerik Report Server... Read more »
