Cohesity expands partnership with Microsoft to improve data restore capabilities for organizations

Cohesity announced it has deepened its relationship with Microsoft to help organizations more quickly respond to and recover from data loss within Microsoft 365 environments. For years, Cohesity and... Read more »

Crunchy Data and Center for Internet Security help businesses secure Postgres deployments

Crunchy Data in collaboration with the Center for Internet Security, announced the publication of the PostgreSQL CIS Benchmark for PostgreSQL 16. Crunchy Data worked with the Defense Information Systems... Read more »

From PKI to PQC: Devising a strategy for the transition

Quantum computers capable of breaking currently used encryption algorithms are an inevitability. And since the US, China and Europe are sprinting to win that arms race, we know that... Read more »

Telemetry gaps leave networks vulnerable as attackers move faster

Telemetry logs are missing in nearly 42% of the attack cases studied, according to Sophos. In 82% of these cases, cybercriminals disabled or wiped out the telemetry to hide... Read more »

Review: Cyberbunker: The Criminal Underworld

Written and directed by Kilian Lieb and Max Rainer, Cyberbunker is a Netflix documentary about a group of hackers that enabled the proliferation of dark web forums where illegal... Read more »

Cyber insurance predictions for 2024

In this Help Net Security video, Dara Gibson, Senior Cyber Insurance Manager at Optiv, discusses cyber insurance and what we should expect to see in 2024: Ransomware, BEC, and... Read more »

AI helps leaders optimize costs and mitigate risks

AI is dominating the mindshare of IT leaders this year and next, as 72% believe their organization will be using more AI in the next two to three years,... Read more »

The new imperative in API security strategy

Of the 239 vulnerabilities, 33% (79 out of 239) were associated with authentication, authorization and access control (AAA) — foundational pillars of API security, according to Wallarm. Prioritizing AAA... Read more »

Next DLP and Torq join forces to automate insider risk detection and response

Next DLP has unveiled a strategic partnership with Torq designed to combat insider risk through heightened detection and automated response actions. Electric adventure vehicle company Rivian will leverage the... Read more »

AppViewX SIGN+ strengthens software supply chain security

AppViewX launched AppViewX SIGN+, a flexible and secure code signing solution that enables DevOps teams to secure their software supply chain. With multiple deployment options, including code signing as... Read more »
Subscribe to our Newsletter