Cybersecurity predictions for 2023: Diversity is key

In this Help Net Security video, John Xereas, Executive Director, Technology Solutions at Raytheon Intelligence & Space, offers his cybersecurity predictions for 2023. Specifically, he talks about the need... Read more »

24% of technology applications contain high-risk security flaws

With, arguably, a higher proportion of applications to contend with than other industries, tech firms would benefit from implementing improved secure coding training and practices for their development teams.... Read more »

Privacy concerns are limiting data usage abilities

Access to data is significantly limited by data privacy and protection regulations, according to a survey conducted by Bloor Research. The report reveals that 60% of the data leaders... Read more »

eBook: 4 ways to secure passwords, avoid corporate account takeover

Enterprising cybercriminals don’t have to work very hard to gain access to your network and all the valuable information stored inside it. That’s because employee accounts are so easy... Read more »

Palo Alto Networks Xpanse Active ASM evaluates cyber risks

Palo Alto Networks has introduced a new Cortex capability: Xpanse Active Attack Surface Management, or Xpanse Active ASM. This helps security teams not just find but also fix their... Read more »

Veracode acquires Crashtest Security to improve web application security

Veracode has acquired Crashtest Security to enhance the existing DAST capabilities available as part of Veracode’s Continuous Software Security Platform and broaden customer access globally. Web applications are fast... Read more »

Vulnerability with public PoC affects Cisco IP phones, fix unavailable (CVE-2022-20968)

A high-risk stack overflow vulnerability (CVE-2022-20968) may allow attackers to DoS or possibly even execute code remotely on Cisco 7800 and 8800 Series IP phones, the company has confirmed.... Read more »

Verimatrix unveils VCAS monitoring in the cloud to accelerate incident detection

Verimatrix has made available its latest cloud-based content protection monitoring capabilities through its Video Content Authority System (VCAS). These newest additions to the Verimatrix VCAS solution bring the option... Read more »

Axiomatics Orchestrated Authorization enhancements centralize authorization strategy

Axiomatics has introduced the next evolution of its Orchestrated Authorization strategy. Through new capabilities and enhancements to the authorization solution, Axiomatics now offers the adaptable and scalable implementation of... Read more »

Product showcase: The Intruder vulnerability management platform

Vulnerability scanning is a fundamental component of every good cyber security strategy – but it can be challenging to get right. Intruder created a vulnerability management platform to make... Read more »
Subscribe to our Newsletter