In this Help Net Security video, John Xereas, Executive Director, Technology Solutions at Raytheon Intelligence & Space, offers his cybersecurity predictions for 2023. Specifically, he talks about the need... Read more »
With, arguably, a higher proportion of applications to contend with than other industries, tech firms would benefit from implementing improved secure coding training and practices for their development teams.... Read more »
Access to data is significantly limited by data privacy and protection regulations, according to a survey conducted by Bloor Research. The report reveals that 60% of the data leaders... Read more »
Enterprising cybercriminals don’t have to work very hard to gain access to your network and all the valuable information stored inside it. That’s because employee accounts are so easy... Read more »
Palo Alto Networks has introduced a new Cortex capability: Xpanse Active Attack Surface Management, or Xpanse Active ASM. This helps security teams not just find but also fix their... Read more »
Veracode has acquired Crashtest Security to enhance the existing DAST capabilities available as part of Veracode’s Continuous Software Security Platform and broaden customer access globally. Web applications are fast... Read more »
A high-risk stack overflow vulnerability (CVE-2022-20968) may allow attackers to DoS or possibly even execute code remotely on Cisco 7800 and 8800 Series IP phones, the company has confirmed.... Read more »
Verimatrix has made available its latest cloud-based content protection monitoring capabilities through its Video Content Authority System (VCAS). These newest additions to the Verimatrix VCAS solution bring the option... Read more »
Axiomatics has introduced the next evolution of its Orchestrated Authorization strategy. Through new capabilities and enhancements to the authorization solution, Axiomatics now offers the adaptable and scalable implementation of... Read more »
Vulnerability scanning is a fundamental component of every good cyber security strategy – but it can be challenging to get right. Intruder created a vulnerability management platform to make... Read more »