Breaking down the state of authentication

In this Help Net Security video, Bassam Al-Khalidi, co-CEO of Axiad, discusses the results of Axiad’s recent State of Authentication Survey. Key findings from the survey revealed: – 39%... Read more »

Escalating cyber threats: Bots, fraud farms, and cryptojacking surge, urgently requiring attention

The motivations behind cyberattacks are as diverse as the methods employed. Whether driven by financial gain, political agendas, or sheer malice, cybercriminals exploit weaknesses in cybersecurity defenses, seeking entry... Read more »

Budget cuts take a toll on IT decision makers’ mental health

60% of IT decision-makers agreed that budget cuts have negatively impacted their mental health and wellbeing, according to Integrity360. To add to that, 55% noted that the current economic... Read more »

Intellicheck announces Identity Platform advancements

Intellicheck announced advancements for digital users of the Intellicheck Identity Platform. Clients integrating the new Capture process can be up and running with no more than two simple web... Read more »

Industrial Defender Risk Signal integrates threat intelligence and business context

Industrial Defender introduced Industrial Defender Risk Signal, its new risk-based vulnerability management (RBVM) solution. Building upon the company’s robust vulnerability assessment capabilities, Industrial Defender Risk Signal intelligently prioritizes vulnerability... Read more »

SentinelOne acquires PingSafe to expand cloud security capabilities

SentinelOne has agreed to acquire PingSafe. The acquisition of PingSafe’s cloud native application protection platform (CNAPP), when combined with SentinelOne’s cloud workload security and cloud data security capabilities, is... Read more »

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts

DriveFS Sleuth automates the investigation of Google Drive File Stream disk artifacts. The tool can parse the disk artifacts and build a filesystem tree-like structure enumerating the synchronized files... Read more »

15 open-source cybersecurity tools you’ll wish you’d known earlier

Open-source tools represent a dynamic force in the technological landscape, embodying innovation, collaboration, and accessibility. These tools, developed with transparency and community-driven principles, empower users with the freedom to... Read more »

The dynamic relationship between AI and application development

In this Help Net Security video, Greg Ellis, General Manager, Application Security, at Digital.ai, discusses how artificial intelligence is revolutionizing the way applications are developed and redefining the possibilities... Read more »

Consumers prepared to ditch brands after cybersecurity issues

In 2023, businesses have been hit with 800,000 cyberattacks, over 60,000 of which were DDoS attacks and 4,000 falling victim to ransomware, according to Vercara. The research found that... Read more »
Subscribe to our Newsletter