Ivanti empowers IT and security teams with new solutions and enhancements

Ivanti released Ivanti Neurons for External Attack Surface management (EASM), which helps combat attack surface expansion with full visibility of external-facing assets and actionable intelligence on exposures. With the... Read more »

Ransomware group maturity should influence ransom payment decision

Your organization has been hit by ransomware and a decision has to be made on whether or not to make the ransom payment to get your data decrypted, deleted... Read more »

Simbian raises $10 million to automate security operations with GenAI

Simbian emerged from stealth mode with oversubscribed $10 million seed funding to deliver on fully autonomous security. As a first step towards that goal, the company is introducing a... Read more »

AppViewX CERT+ helps organizations identify and renew certificates before they expire

AppViewX announced new functionality in the AppViewX CERT+ certificate lifecycle management automation product that helps organizations prepare for Google’s proposed 90-day TLS certificate validity policy. AppViewX CERT+ provides visibility,... Read more »

Digimarc and DataTrails join forces to provide proof of digital content authenticity

Digimarc and DataTrails have partnered to deliver a fully integrated content protection solution to fortify digital content using advanced digital watermarks in tandem with cryptographic proofs, or fingerprints. Combined... Read more »

PVML raises $8 million to offer protection for enterprise data

PVML unveils its platform for secure AI-powered data access and $8 million in Seed funding led by NFX with participation from FJ Labs and Gefen Capital. While the complexity,... Read more »

How Google’s 90-day TLS certificate validity proposal will affect enterprises

Announced last year, Google’s proposal to reduce the lifespan of TLS (transport layer security) certificates from 13 months to 90 days could be implemented in the near future. It... Read more »

Leveraging AI for enhanced compliance and governance

In this Help Net Security interview, Dr. Joseph Sweeney, Advisor at IBRS, discusses the risks of integrating AI into information management systems. He talks about emerging trends such as... Read more »

Graylog: Open-source log management

Graylog is an open-source solution with centralized log management capabilities. It enables teams to collect, store, and analyze data to get answers to security, application, and IT infrastructure questions.... Read more »

37% of publicly shared files expose personal information

Many sensitive documents stored on platforms such as Google Drive, Slack, and other collaborative work applications have been left unattended for several months or even years. This has led... Read more »
Subscribe to our Newsletter